1. The NetBSD packages collection: security/stegtunnel. ftp://ftp.netbsd.org/pub/pkgsrc/current/pkgsrc/security/stegtunnel/README.html. (Date last accessed: September 23 2015). The NetBSD packages collection: security/stegtunnel. ftp://ftp.netbsd.org/pub/pkgsrc/current/pkgsrc/security/stegtunnel/README.html. (Date last accessed: September 23 2015).
2. Part 1: Introduction and general model. https://www.commoncriteriaportal.org/files/ccfiles/ccpart1v21.pdf August 1999. (Date last accessed: September 23 2015). Part 1: Introduction and general model. https://www.commoncriteriaportal.org/files/ccfiles/ccpart1v21.pdf August 1999. (Date last accessed: September 23 2015).
3. Part 3: Security assurance components. https://www.commoncriteriaportal.org/files/ccfiles/ccpart3v2.3.pdf August 2005. (Date last accessed: September 22 2015). Part 3: Security assurance components. https://www.commoncriteriaportal.org/files/ccfiles/ccpart3v2.3.pdf August 2005. (Date last accessed: September 22 2015).
4. NSA's ANT division catalog of exploits for nearly every major software/hardware/firmware. http://leaksource.info/2013/12/30/nsas-ant-division-catalog-of-exploits-for-nearly-every-major-software-hardware-firmware/ 2013. (Date last accessed: September 18 2015). NSA's ANT division catalog of exploits for nearly every major software/hardware/firmware. http://leaksource.info/2013/12/30/nsas-ant-division-catalog-of-exploits-for-nearly-every-major-software-hardware-firmware/ 2013. (Date last accessed: September 18 2015).
5. H. Abelson R. Anderson S. M. Bellovin J. Benaloh M. Blaze W. Diffie J. Gilmore M. Green P. G. Neumann S. Landau etal Keys under doormats: Mandating insecurity by requiring government access to all data and communications. July 2015. 10.1145/2814825 H. Abelson R. Anderson S. M. Bellovin J. Benaloh M. Blaze W. Diffie J. Gilmore M. Green P. G. Neumann S. Landau et al. Keys under doormats: Mandating insecurity by requiring government access to all data and communications. July 2015. 10.1145/2814825