1. CSI/FBI Computer Crime and Security Survey. Computer Security Institute, 1998. Available athttp://www.gocsi.com/prelea11.htm.
2. H. DeMaio, Internet Security: Connecting Without Fear. Info Security News (Supplement), Published by M.I. Sobol, 1995.
3. Internet/Intranet firewall security-policy, architecture and transaction services;Hunt;Computer Communications,1998
4. Computer Weekly, November 16, 1995.
5. A. Rosen, Understanding and Defending Against SYN Attacks, in: Proceedings of Discrete Mathematics and Theoretical Computer Science Workshop on Network Threats, National Science Foundation-Science and Technology Center Piscataway, NJ, December, 1996. (http://www.gocsi.com/prelea11.htm).