[1] Oppliger, R., Internet and Intranet Security, Second Edition , Norwood, MA: Artech House, 2002.
[2] Shirey, R., ˜ ˜Internet Security Glossary, Request for Comments 2828, May 2000.
[3] Parker, D. B., Fighting Computer Crime: A New Framework for Protecting Information , New York: John Wiley & Sons, 1998.
[4] Peltier, T. R., Information Security Risk Analysis , Boca Raton, FL: CRC Press, 2001.
[5] Escamilla, T., Intrusion Detection: Network Security Beyond the Firewall , New York: John Wiley & Sons, 1998.
[6] Amoroso, E., Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response , Sparta, NJ: Intrusion.net Books, 1999.
[7] Northcutt, S., D. McLachlan, and J. Novak, Network Intrusion Detection: An Analyst s Handbook , 2nd ed., Indianapolis, IN: New Riders Publishing, 2000.
[8] Cooper, M., et al., Intrusion Signatures and Analysis , Indianapolis, IN: New Riders Publishing, 2001.
[9] Proctor, P. E., Practical Intrusion Detection Handbook , Englewood Cliffs, NJ: Prentice Hall, 2000.
[10] Bace, R. G., Intrusion Detection , Indianapolis, IN: New Riders Publishing, 1999.
[11] Schneier, B., Secrets and Lies: Digital Security in a Networked World , New York: John Wiley & Sons, 2000.