1. Virtual enterprise networks: the next generation of secure enterprise networking;Caronni,2000
2. An intrusion tolerant transaction management model for wireless storage area networks;Djemaiel,2013
3. Shannon McFarlandS, Sambi M, Nikhil Sharma, Hooda S, “IPV6 for Enterprise Networks”, “CISCO Networks,” Indianapolis, Chapter-4.
4. Andrew S. Tanenbaum, David J. Wetherall, Computer Networks, ”Pearson Edition“, Fifth Edition, Chapter-2, 6, 8.
5. Ghosh, S.K, Dasgupta, P, “Policy Based security analysis in enterprise networks: A Formal Approach,” “Institute of Electrical and Electronics Engineer Transactions on Network and Service Management “, “volume-7, issue-4,” Pages: 231–243.