Robert H'obbes' Zakon. Hobbes' Internet Timeline v2.5.
Barry Leiner. A Brief History of the Internet.
Gregory R. Gromov. The Roads and Crossroads of Internet's History,1996.
Henry Edward Hardy. The History of the Net. Master's Thesis School of Communications
Grand Valley State University Allendale, MI, 1993.
Vinton G. Cerf. The Internet Phenomenon.
Gary Anthes. “Отец” Internet. Computer World. Москва, N 15, 1994. Computer
World.
Morris R.T. A Weakness in the 4.2 BSD UNIX TCP/IP Software. Computing Science Technical
Report No. 117, AT&T Bell Laboratories, Murray Hill, New Jersey, 1985.
Dan Farmer. Shall We Dust Moscow? 18 December 1996.
Теория и практика обеспечения информационной
безопасности, под редакцией Зегжды П.Д., Изд.
“Яхтсмен”, 1996.
Клименко С., Уразметов В., Internet. Среда обитания
информационного общества, Российский Центр
Физико-Технической Информатики, 1995.
U.S. Office of Technology Assessment “Information security and privacy in network
environments.”
Bellovin S. Security Problems in the TCP/IP Protocol Suite.
Larry Lange. 'Hack' punches hole in Microsoft NT security. EE Times, 31.03.97.
Dan Farmer, Wietse Venema. Improving the Security of Your Site by Breaking Into it.
Клиффорд Столл. Яйцо кукушки.
Mark W. Eichin, Jon A. Rochils. With Microscope and Tweezers: An Analysis of the
Internet Virus of November 1988.
Eugene H. Spafford. The Internet Worm Program: An Analysis.
CIAC information bulletin H-07: Sendmail SIGHUP-smtpd Vulnerability.
CIAC information bulletin H-23: Sendmail MIME Conversion Buffer Overrun Vulnerability.
CIAC information bulletin H-34: Vulnerability in innd.
Carl E. Landwehr, Alan R. Bull, John P. McDermott, and William S.Choi. A Taxonomy of
Computer Security Flaws, with Examples. Information Technology Division, Code 5542, Naval
Research Laboratory, Washington, D.C. 20375-5337.
Barton P. Miller и др. Fuzz Revisited: A Re-examination of the Reability of UNIX
Utilities and Services.
Christopher Klaus. A Guide to Internet Security: Becoming an Uebercracker and Becoming
an UeberAdmin to stop Uebercrackers.
CIAC information bulletin E-17: FTP Daemon Vulnerabilities.
Bell Labs Computer Science Technical Report #117, February 25, 1985.