1. Adrian Stoica, A Study on The Information Gathering Method for Penetration Testing, Journal of Security Engineering, May 5, 2008
2. Anthony Bruno, Jacqueline Kim Nov. 18, 2001. Cisco Network Topologies and LAN Design. (c) 2017 Pearson Education, Cisco Press. 800 East 96th Street, Indianapolis, Indiana 46240
3. Chiem, T. P. (2014). A study of penetration testing tools and approaches (Doctoral dissertation, Auckland University of Technology).
4. El-Nazeer, N., & Daimi, K. (2011). Evaluation of Network Port Scanning Tools. In Proceedings of the International Conference on Security and Management (SAM) (p. 1).
5. Gouda, M. G., & Huang, C. T. (2003). A secure address resolution protocol. Computer Networks, 41(1), 57--71.