1. SCHNEIER, B.; 2000; Secrets and Lies, Digital Security in a Networked World; ”Intrusion Detection Systems”; John Wiley & Sons Inc.;
2. BRACKNEY, D.; 2002; ISO/IEC WD 18043 (SC27 N 3180); ”Guidelines for the implementation, operation and management of intrusion detection systems”.
3. VENTER, H.S.; ELOFF, J.H.P.; December 2002; Computers & Security; ”What are the vulnerabilities that we are looking at today?”; Elsevier Science; ISSN 0167-4048.
4. NETWORK ASSOCIATES; 2002; PGP Securities; ”CyberCop Monitor”; http://www.pgp.com/products/cybercop-monitor/default.asp.
5. CISCO SYSTEMS, INC.; 2000; Cisco Secure Scanner; Version 2.0.1.2; http://www.cisco.com.