Bibbliografia
[1]
http://en.wikipedia.org/wiki/Computer_security
[2] Christos Douligeris, Dimitrios N. Serpanos.
Network Security: Current Status and Future Directions.
Wiley-Interscience, A John Wiley & Sons, Inc., Publication.
[3] Jean-Claude Laprie.
Dependability Computing and Fault Tolerance: Concepts and Terminology. LAAS-CNRS.
[4]
http://en.wikipedia.org/wiki/Dependability
[5] Yves Deswarte, Member IEEE, David Powell, Member IEEE.
Internet Secutity: An Intrusion-Tolerance Approach.
[6] Paulo Verìssimo
Intrusion-Tolerance: Concepts and Design Principles. A Tutorial.
[7] D. E. Denning, S. G. Akl, M. Heckman, T. F. Lunt, M.
Morgenstern, P. G. Neumann, and R. R. Schell.
1
Views for multilevel database security.
IEEE Trans. Software Eng., 13(2):129–140, 1987.
[8] Universal Hashing, by Peter Bro Miltersen, March 5, 1998.
[9]
www.cs.cmu.edu/afs/cs.cmu.edu/academic/class/15451.../lec t0215.pdf
[10] www.internet2.it
[11] A Mathematical Theory of Communication, C.E. Shannon, October 1948
[12] LZW: Terry A. Welch: "A Technique for High Performance Data Compression", IEEE Computer vol.
[13] Anomaly Detection: A Survey. Varun Chandola, Arindam Banerjee, and Vipin Kumar, August 15, 2007