1. US Department of Defense Cyber Strategy. http://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf. US Department of Defense. 2015. pages 2--8. US Department of Defense Cyber Strategy. http://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf. US Department of Defense. 2015. pages 2--8.
2. AV-TEST: Malware statistics. http://www.av-test.org/en/statistics/malware AV-TEST: Malware statistics. http://www.av-test.org/en/statistics/malware
3. Linux IP Firewalling Chains. http://people.netfilter.org/rusty/ipchains Linux IP Firewalling Chains. http://people.netfilter.org/rusty/ipchains
4. netfilter: firewalling NAT and packet mangling for Linux. http://www.netfilter.org netfilter: firewalling NAT and packet mangling for Linux. http://www.netfilter.org
5. Snort: Network intrusion detection and prevention system. http://www.snort.org Snort: Network intrusion detection and prevention system. http://www.snort.org