< http://www.cryogenteam.com/firewall.htm > < locale >
< http://bertola.eu.org/icfaq/fondamen.htm > < locale >
< http://www.cisco.com/warp/public/44/jump/routers.shtml >
< http://www.ntmagazine.net/wirefree/0005043.htm > < locale >
< http://www.lib.purdue.edu/proxy/ > < locale >
< http://members.nbci.com/Faenzi/tesi/html/bastion_host.htm > < locale >
< http://www.oreilly.de/catalog/fire/chapter/ch04.html >
< http://www.media.dsi.unimi.it/~linux/sicurezza-1.html > < locale >
< http://www.cknow.com/ckinfo/servicedenial.htm > < locale >
Distributed DoS
< http://www.dia.unisa.it/ads.dir/corso-security/www/CORSO-9900/ddos/index.htm >
< http://www.dia.unisa.it/ads.dir/corso-security/www/CORSO-9900/IPv6/index.htm >
Difesa dagli attacchi DoS
Origini e rimedi
< http://www.nist.gov >
Caso pratico: Checkpoint Firewall-1
< http://www.checkpoint.com/products/firewall-1/index.html >
< http://www.cotse.com/dos.htm > < locale >
< http://www.checkpoint.com/cvpopenspec/ >
< http://www.messagenet.co.uk/products/manuals/firewall/encrypt1.htm#204 >
< locale >
< http://www.netbsd.org/Documentation/network/ipsec/ > < locale >
< http://skip.incog.com/ > < locale >
< http://www.checkpoint.com/techsupport/documentation/fw1/3.0/sr.htm >