Bibliography

Caelli, W., Longley, D., and Shain, M., Information Security Handbook, Stockton Press, New York, 1991.

Chapman, D. B., and Zwicky, E. D. Building Internet Firewalls, O'Reilly & Associates, Sebastopol, CA, 1995.

Cheswick, W. R., and Bellovin, S. M., Firewalls and Internet Security: Repelling the Wily Hacker, Addison-Wesley, New York, 1994.

Comer, D. E., Internetworking with TCP/IP, 3 vols., Prentice-Hall, Englewood Cliffs, NJ, 1991 and 1993.

Garfinkel, S., PGP: Pretty Good Privacy, O'Reilly & Associates, Sebastopol, CA, 1995.

Garfinkel, S., and Spafford, G., Practical UNIX and Internet Security, 2d ed., O'Reilly & Associates., Sebastopol, CA, 1996.

Kaufman, C., Perlman, R., and Speciner, M., Network Security: Private Communication in a Public World, PTR Prentice-Hall, Englewood Cliffs, NJ, 1995.

McGraw, G., and Felten, E. W., Java Security, John Wiley & Sons, New York, 1996.

National Research Council, Computers at Risk: Safe Computing in the Information Age, National Academy Press, Washington, D. C., 1991.

Schneier, B., Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2d ed., John Wiley & Sons, New York, 1996.

1st Security Agent

Mail Bomber

Security Administrator

PC Lockup

Access Lock

Access Administrator Pro

ABC Security Protector

1st Security Agent

Mail Bomber

Security Administrator for Windows

PC Lockup

Access Lock

Access Administrator

ABC Security Protector

http//www.softheap.com