1. Chapman, D.B., Zwicky, E.D., Russell, D.: Building Internet Firewalls. O’Reilly & Associates, Inc., Sebastopol (1995)
2. IFIP Advances in Information and Communication Technology;C.J. Hernandez-Castro,2009
3. Kerr, C., Phaal, R., Probert, D.: A Framework for Strategic Military Capabilities in Defense Transformation. In: International Command and Control Research and Technology Symposium (2006)
4. BBC News. Political Hacktivists Turn To Web Attacks (2010), http://news.bbc.co.uk/1/hi/technology/8506698.stm; This is an electronic document. Date of publication: February 10, 2010. Date retrieved: February 10, 2010. Date last modified: February 10, 2010
5. Wu, C.-H., Huang, C.-C.A., Irwin, J.D.: Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to Against Denial Of Service Attacks and Protect User Privacy. In: Proc. SpringSim 2007, San Diego, CA, USA, pp. 362–369 (2007)