Cisco (2002) "Creating Core Dumps", Internetworking Troubleshooting Handbook, 2nd Edition (Available online at www.cisco.com/univercd/cc/td/doc/cisintwk/itg_v1/tr19aa.htm)
Comer, D. E. (1995) Internetworking with TCP/IP Volume I: Principles, Protocols, and Architecture, 3rd edn. Upper Saddle River, NJ: Prentice Hall.
Henry P.,De Libero G. (1996) "Strategic Networking: From LAN and WAN to Information Superhighways", Massachusetts: International Thomson Publishing Company.
Microsoft (2000) "Interpreting IAS-formatted log files", Microsoft Windows 2000 Server Documentation (Available online at http://www.microsoft.com/windows2000/en/server/help/sag_ias_log1a.htm)
Morris R. T. (1995) "A Weakness in the 4.2BSD UNIX TCP/IP Software," Bell Labs Computer Science Technical Report 117 (February 25, 1985) (Available online at http://www.eecs.harvard.edu/~rtm/papers.html)
Route, Daemon (1997) "Juggernaut," Phrack 50 (Available online at http://www.phrack.com/show.php?p=50&a=6).
Shinkle P. (2002) "Serial Killer Caught By His Own Internet Footprint", St. Louis Post-Dispatch, 6-17-2002.
Shimomura T. and Markoff J. (1996) "Takedown: The Pursuit of Kevin Mitnick, America's Most Wanted Computer Outlaw - by the man who did it". New York: Hyperion.
Stevens W. R. (1994) TCP/IP Illustrated, Volume 1 Boston: Addison Wesley.
Tribune News Services (2000) "Black student charged with racist e-mail threats at college", April 21, 2000.