4Cheswiek William R,Bellovin Steven M.Firewalls and Internet Security -Repelling the Willy Hacker.AT & Bell Lab[EB/ OL].http://www.geocities.congfrancis_abraham/tech_docs/ firewall.html ,2005.
5Wagle C C,Pu C,Beattie Set al.Buffer Overflows:Attacks and Defenses for the Vulnerability of the Decade[M]. DARPA Information Survivability Conference and Exposition(DISCE03), IEEE XPLORE,2003: 227- 237.