1 |
Simson Garfinkel, Gene Spafford, 'Practical UNIX and Internet Security,' O'Reilly&Associates, pp.637-668, 1996
|
2 |
D. Brent Chapman, E. D. Zwicky, 'Building Internet Firewalls,' O'Reilly&Associates, 1995
|
3 |
William R. Cheswick, Steven M. Bellovin, 'Firewalls and Internet Security-repelling the willy hacker,' Addison-Wesley, 1994
|
4 |
이동영, 김동수, 홍승선, 정태명, '웹 기반의 방화벽 통합 보안 관리 시스템 개발', 정보처리학회논문지, 제7권 제10호, pp. 3171-3181, 2000
과학기술학회마을
|
5 |
정연서, 류걸우, 장종수, '네트워크 보안을 위한 ESM 기술 동향', 주간기술동향, 제1026호, pp.24-35, 2001
|
6 |
Harold F. Tipton, Micki Krause, 'Information Security Management Handbook,' Auerbach publications, pp.73-131, 2000
|
7 |
'Technology Update Active Security,' Ernst&Young, LLP, 1999
|
8 |
Charlie Kaufman, Radia Perlman, Mike Speciner, 'Network Security-PRIVATE Communication in a PUBLIC World,' Prentice Hall PTR, pp.6-35, 1995
|
9 |
W. Richard Stevens, 'TCP/IP Illustrated, Volumel The Protocols,' Addison-Wesley, 1994
|
10 |
http://www.cert.org/stats/cert_stats.html
|
11 |
'NIMDA Worm/Virus Report Final,' SANS Institute, 2001
|
12 |
H. Chun Lin, S. Chuan Lai, P. Wen Chen, 'An Algorithm for Automatic Topology Discovery of IP Network,' ICC 98, Vol.2, pp.1192-1196, 1998
DOI
|
13 |
Matt Curtin, Marcus J. Ranum, 'Internet Firewall : Frequently Asked Questions,' http://www.interhack.net/pubs/fwfaq/, 1999
|
14 |
'Internet Firewalls and Security,' 3Com Corporation, 1996
|