Caelli, W., Longley, D., and Shain, M., Information Security Handbook, Stockton Press, New York, 1991.
Chapman, D. B., and Zwicky, E. D. Building Internet Firewalls, O'Reilly & Associates, Sebastopol, CA, 1995.
Cheswick, W. R., and Bellovin, S. M., Firewalls and Internet Security: Repelling the Wily Hacker, Addison-Wesley, New York, 1994.
Comer, D. E., Internetworking with TCP/IP, 3 vols., Prentice-Hall, Englewood Cliffs, NJ, 1991 and 1993.
Garfinkel, S., PGP: Pretty Good Privacy, O'Reilly & Associates, Sebastopol, CA, 1995.
Garfinkel, S., and Spafford, G., Practical UNIX and Internet Security, 2d ed., O'Reilly & Associates., Sebastopol, CA, 1996.
Kaufman, C., Perlman, R., and Speciner, M., Network Security: Private Communication in a Public World, PTR Prentice-Hall, Englewood Cliffs, NJ, 1995.
McGraw, G., and Felten, E. W., Java Security, John Wiley & Sons, New York, 1996.
National Research Council, Computers at Risk: Safe Computing in the Information Age, National Academy Press, Washington, D. C., 1991.
Schneier, B., Applied Cryptography: Protocols, Algorithms, and Source Code
in C, 2d ed., John Wiley & Sons, New York, 1996.