References

References

  • Kenneth Ingham Consulting, K. I., & University of New Mexico, S. F. (n.d.). A History and Survey of Network Firewalls. 1-42. Retrieved July 26, 2016, from https://www.cs.unm.edu/~treport/tr/02-12/firewall.pdf.
  • Enterprise Firewall Protection: Where it stands, where it’s headed. (2000-2016). Retrieved July 26, 2016, from http://searchsecurity.techtarget.com/essentialguide/Enterprise-firewall-protection-Where-it-stands-where-its-headed
  • Brenton, C. (n.d.). Virtual Firewall Appliances-Trust Misplaced? Cloud Security Alliance. doi:https://cloudsecurityalliance.org/wp-content/uploads/2012/02/VirtualFirewallAppliances-TrustMisplaced.pdf
  • Devich, A. (2015, February 26). A brief history of the Firewall. Retrieved August 1, 2016, from https://www.illumio.com/blog/history-of-the-firewall#gsc.tab=0
  • Software, A., & Limited, T. P. (2002). Network security considerations – A primer. Retrieved from http://networking.anandsoft.com/network-security-firewalls.html
Scroll to top