Common Criteria Ver. 2.1. anche ISO 15408
Online http://www.commoncriteria.org/
[2]
Allen Julia H. ``The CERT Guide to System and Network Security Practices'', USA, Addison-Wesley, 2000.
[3]
McClure Stuart, Scambray Joel, Kurtz George ``HACKER!- Prevenire gli attacchi informatici è possibile Tecniche di protezione dei sistemi'', Bologna, Apogeo, 2000.
[4]
Fugini Maria Grazia, Maio Fabrizio, Plebani Pierluigi ``Sicurezza dei Sistemi Informatici'', Bologna, Apogeo,2000.
[5]
Gollmann Dieter``Computer Security'', John Wiley & Sons, 1999.
[6]
Anonymous,``Maximum Linux Security - A hacker's guide to protecting your Linux server and workstation'', USA, SAMS, 1999.
Alberts, Christopher J., Behrens Sandra G. Pethia Richard D., & Wilson William R Operationally Critical Threat, Asset, and Vulnerability
() Framework Version 1.0 (CMU/SEI-99-TR-017), Pittsburg, PA, Software Engineering Institute, Carnegie Mellon University, june 1999.
[9]
Bugtraq Mailing list
Online: http://www.securityfocus.com
[10]
Computer Emergency Response Team
Online: http://www.cert.org/
[11]
SuSE Security Mailing List
Online: http://www.suse.com