References
- Elsberry , R. B. 1999 . The Spying Game: How Safe Are Your Secrets? . Office Systems , September
- Higgins , K. J. 2000 . Human Element is Key to Stopping Hackers . Information Week , May 29
- Franson , P. 2000 . Thwarting Hackers . Electronic Business , May
- Keong , V. 2000 . The Ethical Hack . CA Magazine , January/February
- Janss , S. 2000 . Frontier Defense: Personal Firewalls Software . Network World , August 7
- Anonymous . 1999 . Firewalls Guard Perimeter . Security , June
- Goldman , J. E. 1998 . Applied Data Communications: A Business Oriented Approach , Wiley .
- Kuypers , F. 2000 . Preventing the Hack Attack . Telecommunications , July
- Messmer , E. 2000 . Second Line of Defense . Network World , June 5
- Gips , M. A. 1999 . Is Your Site a Hacker's Delight? . Security Management , August
- Farrow , R. and Power , R. 2000 . Web Server Security . Network Magazine , July
- O'Connell , T. 1999 . Cyber Soldiers . Security , March
- Heiser , J. 1999 . Good Offense Is Best Defense against Back Orifice . Network World , August 9
- Noonan , T. 1999 . Beware the Three Network Security Myths . Computing Canada , November 26
- Dunlap , C. 2000 . Hackers for Hire . Computer Reseller News , February 14