Bellovin, Steven M. "There Be Dragons." Proceedings of the Third Usenix UNIX

Security Symposium, Baltimore, September 1992.

Cheswick, Bill. The Design of a Secure Internet Gateway. AT&T Bell Laboratories

1990.

Dutcher, William. "TACACS, RADIUS Secure Servers." PC Week 20 Oct. 1997: 151-

153.

Karve, Anita. "Public Key Infrastructures." Network Magazine November 1997: 69-73.

McHue, Josh. "Politics for the really cool." Forbes 08 Sept. 1997: 172-179.

Netizen. "What Have They Been Smoking?" Wired September 1997: 53-56.

Netizen. "Your Master's Voice." Wired August 1997: 45-48, 164-165.

Neuman, B. Clifford. "Protection and Security Issues for Future Systems." Dagstuhl

Castle, Germany, July 1991.

Orman, Hilarie, et al. Paving the Road to Network Security or the Value of Small

Cobblestones. U of Arizona: 1994.

Power, Richard and Farrow, Rik. "Network Defense: Electronic Commerce Crime."

Network Magazine December 1997: 131-132.

Power, Richard and Farrow, Rik. "Network Defense: Take Security Seriously?"

Network Magazine January 1998: 108-109.

Ranum, Marcus J. Thinking About Firewalls. Trusted Information Systems, Inc.: 1994.

Rash, Wayne. "The Market Needs the Right Connections." InternetWeek 03 Nov.

1997: 90.

Smith, Danny. Enhancing Security of Unix Systems. Diss. U of Queensland, 1994.
|