| Andrew S. Tanenbaum, Computer Networks, 3d. Ed. (1996), pp. 28-39, 396-417, 601-621, 681-695. |
| “Securing Communications on the Intranet and Over the Internet”, Netscape Commnunications Corporation (Jul. 1996), pp. 1-12. |
| “WebSTAR/SSL Security Toolkit: Troubleshooting”, no later than Aug. 4, 1998, pp. 1-2. |
| Paul Ferguson, “What is a VPN?”, Apr. 1998, pp. 1-22. |
| Virtual Private Networking: An Overview, no later than Jun, 25, 1998, pp. 1-20. |
| “How the proxy works”, Jul. 22, 1998, pp. 1-2. |
| Microsoft Proxy Server Marketing Bulletin, 1998, pp. 1-8. |
| Microsoft Proxy Server What's New, 1998, pp. 1-4. |
| “CSM Proxy Server White Paper”, 1995-1998, pp. 1-13. |
| “CSM Proxy Server, the Ultimate Gateway to the Internet!”, no later than Aug. 4, 1998, pp. 1-5. |
| Qun Zhong et al., “Security Control for COTS Components”, Jun. 1998, IEEE Computer, pp. 67-73. |
| “r3 CypherClient Information”, 1998, pp. 1-4. |
| NetSafe V3.0 The Firewall Solution from Siemens Nixdorf, May 31, 1997, pp. 1-3. |
| SUBMISSION: HTTPS v1.0 Package for OmniWeb 3.x (Rhapsody), Jan. 24, 1998, pp. 1-3. |
| OWF basics, Mar. 31, 1997, pp. 1-2. |
| “info needed to write https proxy”, Apr. 11, 1996. |
| Webroute 1.3.0, May 28, 1997, pp. 1-2. |
| Werner Feibel, Novell's Complete Encyclopedia of Networking, 1995, pp. 625-630. |
| Bruce Schneier, Applied Cryptography, 1994, pp. 436-437. |
| “A New Management and Security Architecture for Extranets”, 1996-1999, pp. 1-14. |
| Netscape Proxy Server Administrator's Guide, 1997, Contents, Introduction, and Chapters 1-17. |