Bibliografia

1.http://pdf.aminer.org/000/395/467/firewall_policy_advisor_for_anomaly_discovery_and_rule_editing.pdf - E. Al-Shaer and H. Hamed. “Design and Implementation of Firewall Policy Advisor Tools.” Technical Report CTI-techrep0801, School of Computer Science Telecommunications and Information Systems, DePaul University, August 2002. - W. Cheswick and S. Belovin. Firewalls and Internet Security, Addison-Wesley, 1995. - P. Eronen and J. Zitting. “An Expert System for Analyzing Firewall Rules.” Proceedings of 6th Nordic Workshop on Secure IT-Systems (NordSec 2001), November 2001. 2. http://www.vasa.abo.fi/itintro/How%20Firewalls%20Work.pdf 3. http://www.bullguard.com/pt-br/bullguard-security-center/pc-security/computer-security-resources/how-does-a-firewall-work.aspx - Building internet firewalls. DB Chapman, ED Zwicky, D Russell - 1995 - dl.acm.org 4. https://www.usenix.org/sites/default/files/conference/protected-files/winter_foci12_slides.pdf - How the Great Firewall of China is Blocking Tor P Winter, S Lindskog - Proceedings of the 2nd USENIX Workshop, 2012 5. http://repository.root-me.org/Réseau/EN%20-%20NIST%20guidelines%20on%20firewalls%20and%20firewall%20policy.pdf - Guidelines on Firewalls and Firewall Policy K Scarfone, P Hoffman - NIST Special Publication, 2009


< Perguntas