2002) "Creating Core Dumps", Internetworking Troubleshooting Handbook, 2nd Edition (Available online at www.cisco.com/univercd/cc/td/doc/cisintwk/itg_v1/tr19aa)
(1995) Internetworking with TCP/IP Volume I: Principles, Protocols, and Architecture, 3rd edn. Upper Saddle River, NJ: Prentice Hall.
(1996) "Strategic Networking: From LAN and WAN to Information Superhighways", Massachusetts: International Thomson Publishing Company.
(Microsoft (2000) "Interpreting IAS-formatted log files", Microsoft Windows 2000 Server Documentation (Available online at http://www.microsoft.com/windows2000/en/server/help/sag_ias_log1a)
1995) "A Weakness in the 4.2BSD UNIX TCP/IP Software," Bell Labs Computer Science Technical Report 117 (February 25, 1985) (Available online at http://www.eecs.harvard.edu/~rtm/papersl)
(1997) "Juggernaut," Phrack 50 (Available online at http://www.phrack.com/show.php?p=50&a=6).
(2002) "Serial Killer Caught By His Own Internet Footprint", St. Louis Post-Dispatch, 6-17-2002.
(1996) "Takedown: The Pursuit of Kevin Mitnick, America's Most Wanted Computer Outlaw - by the man who did it". New York: Hyperion.
(1994) TCP/IP Illustrated, Boston: Addison Wesley.
(Tribune News Services (2000) "Black student charged with racist e-mail threats at college", April 21, 2000.