Richard H. Baker, “Network Security: how to plan for it and achieve it,”McGraw-Hill International, 1995. Computer Security Institute, “1999 CSI/FBI Computer Crime and Security Survey,” CSI, Winter 1999. http://www.gocsi.com David Icove [John D. Howard, “An Analysis Of Security Incidents On The Internet 1989 - 1995,” PhD thesis, Engineering and Public Policy, Carnegie Mellon University, 1997. Simson Garfinkel, “PGP: Pretty Good Privacy,” O’Reilly & Associ-ates, Inc., 1995 Christopher M. King, Curtis E. Dalton, dan T. Ertem Osmanoglu, “Security Architecture: Design, Deployment & Operation,” Osborne / McGraw-Hill, 2001. Charles P. Pfleeger, “Security in Computing,” Prentice-Hall International,1997 Budi Raharjo, Keamanan Sistem Informasi Berbasis Internet ,PT Insan Infonesia - Bandung & PT INDOCISC – Jakarta 1998, 1999, 2000, 2001, 2002 Joel Scambray, Stuart McClure, and George Kurtz, “Hacking Exposed: Network Security Secrets and Solutions,” first and second edition, McGraw-Hill, 2001. William Stallings, “Network and Internetwork Security,” Prentice Hall, 1995. CSI (Computer Security Institute) , http://www.gocsi.com ICSA (International Computer Security Association),http://www.icsa.net/ Securiteam.com, http://www.securiteam.com, Breaking news tentang security hole, tools. http://www.isaca.org ; http://www.cissp.com; http://www.eccouncil.org; http://www.idsirtii.or.id; http://www.jasakom.com buku-buku mengenai keamanan komputer cetakan, e-book, majalah-majalah/tabloid komputer edisi cetak maupun edisi online.
1