2[1]Stallings W. Network and Internetwork Security Principles and Practice. IEEE Computer Society Press,1995
3[2]RFC 791,Internet Protocol,1981
4[3]Hare C,Siyan K. Internet Firewalls and Network Security,1996
5[4]Anonymous. Maximum Security, Sams. Net Publishing, 1997
6[5]Farley M,Stearns T. LAN Times Guide to Security and Data Integrity. McGraw-Hill Inc. , 1996
7[6]Escamilla T. Intrusion Detection. John Wiley & Sons Inc. , 1998
8[6]National Computer Security Center. A Guide to understanding audit in trusted systems[S].NCSC TG-001, version 2,June 1988.
9[1]National Computer Security Center. Department of defense trusted computer system evaluation criteria[S]. December 1985. DoD5200.28-STD
10[2]National Computer Security Center. Trusted database management system interpretation of the trusted computer system evaluation criteria[S]. NCSC-TG-021, April 1991.