Bibliografia:

[1]TANENBAUM, Andrew S; VAN STEEN, Maarten. Distributed Systems: Principles and Paradigms. 2. ed. Upper Saddle River, Nj: Pearson Prentice Hall, 2006.

[2]COULORIS, George; DOLLIMORE, Jean; KINDBERG, Tim. Sistemas Distribuídos: Conceitos e Projetos. 4. ed. Porto Alegre, Rs, Brasil: Bookman, 2007.

[3]ROUSE, Margaret. Firewall. 2014. From Secure Web gateways, from evaluation to sealed deal. Disponível em: http://searchsecurity.techtarget.com/definition/firewall. Acesso em: 13 de maio de 2015.

[4]PACCHIANO, Ronald. Firewall Debate: Hardware vs. Software. 2011. Disponível em: http://www.smallbusinesscomputing.com/webmaster/article.php/3103431/Firewall-Debate-Hardware-vs-Software.htm. Acesso em: 13 de maio de 2015.

[5]MCDOWELL, Mindi and HOUSEHOLDER, Allen. Security Tip: Understanding Firewalls. 2009. Disponível em https://www.us-cert.gov/ncas/tips/ST04-004. Acesso em: 14 de maio de 2015.

[6]STODDARD, Donald and THOMAS, Thomas. Network Security First-Step, 2nd edition, chapter 7. 2012. Disponível em http://ptgmedia.pearsoncmg.com/images/9781587204104/samplepages/158720410X.pdf. Acesso em: 14 de maio de 2015.

[7]NESSET, Danny and SHERER, William. Multilayer firewall system. 1999. Disponível em https://docs.google.com/viewer?url=patentimages.storage.googleapis.com/pdfs/US5968176.pdf. Acesso em: 14 de maio de 2015.

[8] WESINGER, Ralph and COLEY, Christopher. Firewall providing enhanced network security and user transparency. 1999. Disponível em https://docs.google.com/viewer?url=patentimages.storage.googleapis.com/pdfs/US5898830.pdf. Acesso em: 14 de maio de 2015.

[9] BELLOVIN, S.m.; CHESWICK, W.r.. Network firewalls. Ieee Communications Magazine, [s.l.], v. 32, n. 9, p.50-57, set. 1994. Institute of Electrical & Electronics Engineers (IEEE). DOI: 10.1109/35.312843. Disponível em http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=312843&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel1%2F35%2F7577%2F00312843. Acesso em: 23 de maio de 2015