[1] Oppliger, R., Internet and Intranet Security, Second Edition , Norwood, MA: Artech House, 2002.
[2] Fraser, B., ˜ ˜Site Security Handbook, Request for Comments 2196, September 1997.
[3] Shirey, R., ˜ ˜Internet Security Glossary, Request for Comments 2828, May 2000.
[4] Cheswick, W. R., and S. M. Bellovin, Firewalls and Internet Security: Repelling the Wily Hacker , Reading, MA: Addison-Wesley, 1994.
[5] Cheswick, W. R., and S. M. Bellovin, ˜ ˜Network Firewalls, IEEE Communications Magazine , September 1994, pp. 50 “57.
[6] Siyan, K., and C. Hare, Internet Firewalls and Network Security , Indianapolis, IN: New Riders Publishing, 1995.
[7] Zwicky, E. D., et al., Building Internet Firewalls , 2nd Edition, Sebastopol, CA: O Reilly & Associates, 2000.
[8] Garfinkel, S., and G. Spafford, Practical UNIX and Internet Security , 2nd ed., Sebastopol, CA: O Reilly & Associates, 1996.
[9] Mogul, J. C., ˜ ˜Simple and Flexible Datagram Access Controls for UNIX-Based Gateways, Proceedings of the USENIX Summer Conference , 1989, pp. 203 “221.
[10] Cheswick, B., ˜ ˜The Design of a Secure Internet Gateway, Proceedings of the USENIX Summer Conference , 1990, pp. 233 “237.
[11] Ranum, M. J., ˜ ˜A Network Firewall, Proceedings of World Conference on System Administration Security , July 1992, pp. 153 “163.
[12] Chapman, D. B., ˜ ˜Network (In)Security Through IP Packet Filtering, Proceedings of USENIX UNIX Security Symposium III , September 1992, pp. 63 “76.
[13] Avolio, F., and M. J. Ranum, ˜ ˜A Network Perimeter with Secure Internet Access, Proceedings of the Internet Society Symposium on Network and Distributed System Security , February 1994, pp. 109 “119.
[14] Koblas, D., and M. R. Koblas, ˜ ˜SOCKS, Proceedings of USENIX UNIX Security III Symposium , September 1992, pp. 77 “82.
[15] Leech, M., et al., ˜ ˜SOCKS Protocol Version 5, Request for Comments 1928, March 1996.
[16] Leech, M., ˜ ˜Username/Password Authentication for SOCKS V5, Request for Comments 1929, March 1996.
[17] McMahon, P., ˜ ˜GSS-API Authentication Method for SOCKS Version 5, Request for Comments 1961, June 1996.
[18] Rigney, C., et al., ˜ ˜Remote Authentication Dial-In User Service (RADIUS), Request for Comments 2138, April 1997.
[19] Rigney, C., ˜ ˜RADIUS Accounting, Request for Comments 2139, April 1997.
[20] Finseth, C., ˜ ˜An Access Control Protocol, Sometimes Called TACACS, Request for Comments 1492, July 1993.
[21] Rekhter, Y., et al., ˜ ˜Address Allocation for Private Internets, Request for Comments 1918 (BCP 5), February 1996.
[22] Oppliger, R., ˜ ˜Internet Kiosk: Internet Security Enters the Middle Ages, IEEE Computer , Vol. 28, October 1995, pp. 100 “101.