[1] Oskar Andreasson. Iptables tutorial. http://iptables-tutorial.frozentux.net/iptables-tutorial.htm.
[2] Renaud Deraison. Nessus Vulnerability Scanner. http://www.nessus.org/about/.
[3] Joshua Drake. Linux Networking HOWTO. LDP (Linux Documentation Project), 2000.
[4] R. Droms. Dynamic Host Configuration Protocol. http://www.ietf.org/rfc/rfc2131.txt, March 1977.
[5] Behrouz Forouzan. TCP/IP Protocol Suite. McGraw-Hill, 2000.
[6] IANA (Internet Assigned Numbers Authority), http://www.iana.org/assignments/port-numbers. The well known ports number.
[7] Insecure.Org, http://insecure.org/nmap/. Nmap.
[8] James F. Kurose and Keith W. Ross. Computer Networking: A Top-Down Approach Featuring the Internet (3rd Edition). Addison Wesley, 2005.
[9] Bhagwandas Pannalal Lathi. Introducción a la Teoría y Sistemas de Comunicación. Limusa Noriega Editores, 1994.
[10] Alan V. Oppenheim and Ronald W. Schafer. Discrete-time signal processing. Prentice Hall, 1999.
[11] Alan V. Oppenheim, Alan S. Willsky, and S. Hamid Nawab. Señales y Sistemas (2a edición). Prentice Hall, 1997.
[12] Rusty Russell. Linux 2.4 Packet Filtering HOWTO. http://www.netfilter.org/documentation/HOWTO/packet-filtering-HOWTO.html.
[13] Claude E. Shannon. The Mathematical Theory of Communication. University of Illinois Press, 1963.
[14] SSH Communications Security Corp, http://www.rfc-editor.org/rfc/rfc4251.txt. RFC 4251. The Secure Shell (SSH) Protocol Architecture, 2006.
[15] SSH Communications Security Corp, http://www.rfc-editor.org/rfc/rfc4252.txt. RFC 4252. The Secure Shell (SSH) User Authentication Protocol, 2006.
[16] SSH Communications Security Corp, http://www.rfc-editor.org/rfc/rfc4253.txt. RFC 4253. The Secure Shell (SSH) Transport Layer Protocol, 2006.
[17] SSH Communications Security Corp, http://www.rfc-editor.org/rfc/rfc4254.txt. RFC 4254. The Secure Shell (SSH) Connection Protocol, 2006.
[18] William Stallings. Comunicaciones y Redes de Computadores (7a Edición). Prentice Hall, 2004.