Robert H'obbes' Zakon. Hobbes' Internet Timeline v2.5.
Barry Leiner. A Brief History of the Internet.
Gregory R. Gromov. The Roads and Crossroads of Internet's History,1996.
Henry Edward Hardy. The History of the Net. Master's Thesis School of Communications
Grand Valley State University Allendale, MI, 1993.
Vinton G. Cerf. The Internet Phenomenon.
Gary Anthes. “Отец” Internet. Computer World. Москва, N 15, 1994. Computer
World.
Morris R.T. A Weakness in the 4.2 BSD UNIX TCP/IP Software. Computing Science
Technical Report No. 117, AT&T Bell Laboratories, Murray Hill, New Jersey,
1985.
Dan Farmer. Shall We Dust Moscow? 18 December 1996.
Теория и практика обеспечения информационной безопасности, под редакцией
Зегжды П.Д., Изд. “Яхтсмен”, 1996.
Клименко С., Уразметов В., Internet. Среда обитания информационного общества,
Российский Центр Физико-Технической Информатики, 1995.
U.S. Office of Technology Assessment “Information security and privacy in
network environments.”
Bellovin S. Security Problems in the TCP/IP Protocol Suite.
Larry Lange. 'Hack' punches hole in Microsoft NT security. EE Times, 31.03.97.
Dan Farmer, Wietse Venema. Improving the Security of Your Site by Breaking
Into it.
Клиффорд Столл. Яйцо кукушки.
Mark W. Eichin, Jon A. Rochils. With Microscope and Tweezers: An Analysis
of the Internet Virus of November 1988.
Eugene H. Spafford. The Internet Worm Program: An Analysis.
CIAC information bulletin H-07: Sendmail SIGHUP-smtpd Vulnerability.
CIAC information bulletin H-23: Sendmail MIME Conversion Buffer Overrun
Vulnerability.
CIAC information bulletin H-34: Vulnerability in innd.
Carl E. Landwehr, Alan R. Bull, John P. McDermott, and William S.Choi. A
Taxonomy of Computer Security Flaws, with Examples. Information Technology
Division, Code 5542, Naval Research Laboratory, Washington, D.C. 20375-5337.
Barton P. Miller и др. Fuzz Revisited: A Re-examination of the Reability
of UNIX Utilities and Services.
Christopher Klaus. A Guide to Internet Security: Becoming an Uebercracker
and Becoming an UeberAdmin to stop Uebercrackers.
CIAC information bulletin E-17: FTP Daemon Vulnerabilities.
Bell Labs Computer Science Technical Report #117, February 25, 1985.