AUDI04 Audin, G. "Next-Gen Firewalls: What to Expect." Business Communications Review, June 2004.
BELL94b Bellovin, S., and Cheswick, W. "Network Firewalls." IEEE Communications Magazine, September 1994.
CHAP00 Chapman, D., and Zwicky, E. Building Internet Firewalls. Sebastopol, CA: O'Reilly, 2000.
CHES03 Cheswick, W., and Bellovin, S. Firewalls and Internet Security: Repelling the Wily Hacker. Reading, MA: Addison-Wesley, 2003.
FELT03 Felten, E. "Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks?" IEEE Security and Privacy, May/June 2003.
GASS88 Gasser, M. Building a Secure Computer System. New York: Van Nostrand Reinhold, 1988.
GOLL99 Gollmann, D. Computer Security. New York: Wiley, 1999.
LODI98 Lodin, S., and Schuba, C. "Firewalls Fend Off Invasions from the Net." IEEE Spectrum, February 1998.
OPPL97 Oppliger, R. "Internet Security: Firewalls and Beyond." Communications of the ACM, May 1997.
OPPL05 Oppliger, R., and Rytz, R. "Does Trusted Computing Remedy Computer Security Problems?" IEEE Security and Privacy, March/April 2005.
PFLE03 Pfleeger, C. Security in Computing. Upper Saddle River, NJ: Prentice Hall, 1997.
WACK02 Wack, J.; Cutler, K.; and Pole, J. Guidelines on Firewalls and Firewall Policy. NIST Special Publication SP 800-41, January 2002.
WILS05 Wilson, J. "The Future of the Firewall."Business Communications Review, May 2005.