Building Internet Firewalls, autorzy: E. Zwicky, Simon Cooper, D. Chapman,
wydawnictwo O’Reilly;
Vademecum Teleinformatyka, str. 226, wydanie drugie, opracowanie Networld, Warszawa 1999 r.;
Maximum Security: A Hacker’s Guide to Protecting Your Internet Site and Network, 2nd Edition, autor anonimowy, polski przekład: Robomatic s.c., Wrocław 1998 r.;
Router Security, (http://www.softpanorama.org/Security/network_securi-ty.shtml);
VCCS Security Guidelines for Edge Devices, Virginia Community College System, (http://helpnet.vccs.edu/NOC/Network/SecurityGuidelinesv2.11.doc);
Securing Low-End Cisco Routers, autor: Spender, 2003,(http://packetstorm.li-
nuxsecurity.com/cisco/cisco.txt);
How do I secure a Cisco router from the Internet?, Cisco Forum FAQ 40.0 Security, (http://www.broadbandreports.com/faq/7766);
Improving Security on Cisco Routers, Cisco Systems,(http://www.cisco.com
/warp/public/707/21.html);
Router Security Configuration Guide (część I i II) National Security Agency,
(http://nsa2.www.conxion.com/cisco/guides/cis-1.pdf),
(http://nsa2.www.conxion.com/cisco/guides/cis-2.pdf);
Projektowanie bezpiecznej konfiguracji sieci, autor: Tomasz Kruk, 2004, (www.ia.pw.edu.pl/~tkruk/latex/t2.pdf);
Cisco: pierwsze produkty NAC, Networld (http://www.idg.pl/news/
68182/100.html);
Bezpieczeństwo routerów Cisco, autor: Waldemar Pierścionek, PCkurier, 19/2001,(http://www.pckurier.pl/archiwum/artykuly/pierscionek_waldemar/2001_19_74);
Penetration Testing IPsec VPNs, autorzy: Rohyt Belani, K. K. Mookhey (http://www.securityfocus.com/infocus/1821);
Exploiting Cisco Routers: Part 1, autor: Mark Wolfgang, 2003, (http://www.securityfocus.com/infocus/1734);
Exploiting Cisco Routers: Part 2, autor: Mark Wolfgang, 2003, (http://www.securityfocus.com/infocus/1749);
Cisco IOS z punktu widzenia intruza, autor: Kamil Folga, Hackin9, 6/2004;
Zło czai się w tunelu¸ autor: Patryk Królikowski, Networld, 3/2007;
Zdalne rozpoznawanie systemów operacyjnych, autor: Łukasz Nowicki, Hackin9, 5/2003;
Wardriving pieszo i samochodem, autor: Patryk Królikowski, Networld, 5/2007;
Bypassing firewalls with tunnels, autor: Martin Ferretti, 2005, (http://www.tipmonki-es.com/2005/08/08/bypassing-firewalls-with-tunnels);
Stealing the network: how to own the box¸ autorzy: Ryan Russel, Tim Mullen, Dan Kaminsky, Syngress, Black Hat Inc., 2003;
Firewall Penetration Testing, autor: Mount Arrarat Blossom, 2000, (http://wittys.com/files/mab/fwpentesting.html);
Punching holes into firewalls, autor: anonimowy, 2007, (http://sebsauvage.net
/punching/);
SSH Tunnels: Bypass (almost) any firewall, autor: pazkooda, 2006, (http://polishlinux.org/apps/ssh-tunneling-to-bypass-corporate-firewalls);
Wardriving w praktyce, autor: Michał Szymański, Hackin9, 3/2003;
Demystifying Penetration Testing¸ autor: Debasis Mohanty, (http://www.info-secwriters.com/text_resources/pdf/pen_test2.pdf);
Hacking Through Firewalls, autor: Paul Troncone, Penetration Testing Security Focus Group, (http://sfs.poly.edu/presentations/PaulT_firewalls.pdf);
How to Bypass Most Firewall Restrictions and Access the Internet Privately aka The Surf At Work Page, autor: anonimowy, 2006, (http://www.buzz
surf.com/surfatwork/);
Hacking Exposed, Fifth Edition, (rozdział 9 - Hacking Firewalls), autorzy: Stuart McClure, Joel Scambray, George Kurtz, 2005;
Techniques used for bypassing firewall systems, autor: Adam Gowdiak, Pol34CERT, 2003, (http://www.terena.nl/activities/tf-csirt/meeting9/gowdiak-bypassing-firewalls.pdf);
Bypassing firewall, autor: Ricky Lou, Zecure Lab Limited, 2005, (www.pisa.org.hk/event/bypassfw.pdf);
The enemy Within: Firewalls and Backdoors, autorzy: BobRudin, Phil Kostenbader, 2003, (http://www.securityfocus.com/infocus/1701);
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions, autorzy: by Andrew A. Vladimirov, Konstantin V. Gavrilenko, Janis N. Vizulis and Andrei A. Mikhailovsky, McGraw-Hill/Osborne, 2006;
Copyright © 2008-2010 EPrace oraz autorzy prac.