References
- Hunt, R, 1998. Internet/intranet firewall security-policy, architecture and transaction services, Comput Commun 21 (1998), pp. 1107–23.
- 1999. The case of the dropped packets: tests solve firewall mystery, Commun News 36 (8) (1999), p. 36.
- Anthes, G H, 1998. Firewalls stand the heat, Computerworld 36 (1998), p. 62.
- Guttman, B, and Bagwill, R, 1997. Internet security policy: a technical guide. 1997, NIST special publication 800-XX http://csrc.nist.gov/isptg/html/ISPTG.html (12 Dec 2000).
- Fratto, M, 1999. The ‘ins’ and ‘outs’ of firewall security, Network Comput (1999), http://www.networkcomputing.com/1018/1018ws1.html (28 May 2000).
- Blacharski, D, 2000. Outsourcing security: is turning over the keys the best way to secure your enterprise?, Network Mag (2000), http://www.networkmagazine.com/magazine/archive/2000/02/0002srs3.htm (28 May 2000).
- Curtin, M, and Ranum, M J, 1999. Internet firewalls: frequently asked questions, revision 9.4. 1999, http://www.interhack.net/pubs/fwfaq/ (12 Dec 1999).
- 1995. 1995, Code of Ethics of the American Library Association, adopted by the ALA Council http://www.ala.org/alaorg/oif/ethics.html (18 May 2000).
- Lawson, N, and Garris, J, 1999. Plug your company's common security holes, PC Mag (1999), p. 217.
- 2000. IT Security Cookbook, Firewalls: a technical overview. Rev. (2000), http://www.boran.com/security/it12-firewall.html (5 Apr 2000).