[1] 2011 Cybersecurtiy Watch Survey.
http://www.idgenterprise.com/5/post/2011
/01/2011-cybersecurity-watch-survey-organizations-need-more-skilled-c
yberprofessionals-to-stay-secure.html
[2] Gartner, Information Technology Research and Advisory. www.gartner.com
[3] “Cisco NAC Appliance Enforcing Host Security with Clean Access Jamey Heary,” CCIE? No. 7680, 2007.
[4] Juniper Unified Access Control. http://www.juniper.net/us/en/products-services/security/uac/#overview
[5] Trusted Network Connect. http://www.trustedcomputinggroup.org/developers/trusted_network_connect
[6] Cisco NAC OOB Deployment.
http://www.cisco.com/en/US/products/ps6128/
products_configuration_example09186a0080a138cc.shtml
[7] Firewall policy rules using Fully Qualified Domain Name.
http://www.cisco.com/en/US/docs/security/
security_management/cisco_security_manager/security_
manager/4.2/us er/ guide/fwident.pdf