1. Anonymous (1995) IP spoofing attacks latest threat. Computer Fraud 6 Security Bulletin, March 1995, 1–2.
2. Bokhari, S.H. (1995) The Linux Operating System. IEEE Computer, 28, 8, 74–9.
3. Boshoff, W.H. (1989) A Path Context Model for Computer Security Phenomena in Po-tentially Non-Secure Environments. Ph.D Dissertation, Rand Afrikaans University, Jo-hannesburg.
4. Boshoff, W.H. and Von Solms, S.H. (1989) A Path Context Model for Addressing Security in Potentially Non-secure Environments. Computers 1X1 Security, 8, 417–25.
5. Boshoff, W.H. and Von Solms, S.H. (1990) Application of a Path Context Approach to Computer Security Fundamentals. Information Age, 12, 2, 83–90.