Margaret J. Brown, "The Visto Briefcase Pro Puts Your PIM On The Internet", URL:http://www.zdnet.com/zdnn/stories/zdnn.sub.-- display/0,3440,341892,00.html, Aug. 13, 1998, 1 page. |
Web site entitled "Bookmark Translator 2.0: This Utility transform Microsoft Internet Explore's bookmarks in the format valid for Netscape Navigator and viceversa," Enzo Marinacci, Rome--Jul. 1997, URL=http://www.bns.it/emware/Bookmark Translator-uk.htm, pp. 1-4. |
Article by Bellovin et al., entitled: "Network Firewalls" Published by IEEE Communications Magazine Sep. 1994, pp. 50-57. |
Article by Steffen Stempel, entitled: "IPAccess--An Internet Service Access System for Firewall Installations" Published by IEEE Communications Magazine Feb. 16, 1995, pp. 31-41. |
Article by Braun et al., entitled: "Web Traffic Characterization: an assessment of the impact of caching documents from NCSA's web server" Published by Elsevier Science B.V. 1995 pp. 37-51. |
Article by Nelson et al., entitled: "Security for Infinite Networks" Published by IEEE Communications Magazine on Aug. 22, 1995, pp. 11-19. |
Article by Greenwald et al., entitled: "Designing an Academic Firewall: Policy, Practice, and Experience with SURF" Published by IEEE Communications Magazine on Feb. 22, 1996, pp. 79-92. |
Article by Kiuchi et al., entitled: "C-HTTP--The Development of a Secure, Closed HTTP-based Network on the Internet" Published by IEEE Proceedings of SNDSS on Feb. 22, 1996, pp. 64-75. |
Article by S. Cobb, entitled: "Establishing Firewall Policy" Published by National Computer Security Assn. on Jun. 25-27, 1996, pp. 198-205. |