Further Reading
- Behringer, M. H., and M. J. Morrow. MPLS VPN Security. Cisco Press, 2005. ISBN: 1-58705-183-4.
- Greene, B. R., and D. McPherson. "ISP Security: Deploying and Using Sinkholes." NANOG 28. Salt Lake City, Utah. June 2003. http://www.nanog.org/mtg-0306/sink.html.
- McDowell, R. "Implications of Securing Backbone Router Infrastructure." NANOG 31. San Francisco. May 4, 2004. http://www.nanog.org/mtg-0405/mcdowell.html.
- Meyer, D. A. "Complexity and Service Provider Networks in the 21st Century." SANOG V. Dhaka, Bangladesh. Feb. 5, 2005. http://www.sanog.org/resources/sanog5-dave-keynote.pdf.
- Schudel, G. W., and B J. Wood. "Adversary Work Factor as a Metric for Information Assurance." Proceedings of the New Security Paradigms Workshop. Ballycotton, County Cork, Ireland. Sept. 19, 2000. ISBN: 1-58113-260-3. http://www.csl.sri.com/~bjwood/nspw_wood_v1e.pdf.
- "Internet Exchanges/Internet Exchange Points/BGP Peering Points/IXP." BGP4AS. http://www.bgp4.as/internet-exchanges.
- "NAT Order of Operation." (Doc. ID: 6209.) Cisco Tech Note. http://www.cisco.com/warp/public/556/5.html.
- "The Team Cymru Bogon Reference Page." Team Cymru. http://www.cymru.com/Bogons/index.html.