Computer Security, Principles and Practice
William Stallings, Lawrie Brown
Cyber Security and IT Infrastructure Protection
John Vacca
Buffer Overflow Attack
Signature-Based vs. Rule-Based WAFs
Differences between Packet Firewall, Stateful Firewall and Application Firewall