1. Kahate, A.: Cryptography and Network security. Tata Mc Graw Hill Publishing Company Limited (2003)
2. Lincke, S.J., Hollan, A.: Network Security: Focus on Security, Skills, and Stability. In: Proceedings of 37th ASEE/IEEE Frontiers in Education Conference
3. Zhang, L., White, G.B.: Anomaly Detection for Application Level Network Attacks Using Payload Keywords. In: Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA 2007 (2007)
4. Khalifa, O.O., Rafiqul Islam, M., Khan, S., Shebani, M.S.: Communications Cryptography. In: Proceedings RF and Microwave Conference, RFM 2004 (2004)
5. Nadeem, A., Younus Javed, M.: A performance comparison of data Encryption Algorithm. In: Global Telecommunications Conference Workshops, Globe COM Workshops 2004. IEEE, Los Alamitos (2004)