[1] Paul Albitz and Cricket Liu. DNS and BIND. O'Reilly, 3 edition, 1998. ISBN: 1-56592-512-2. [2] Richard Bejtlich. The Tao of Network Security: Beyond Intrusion Detection. Addison-Wesley, 2005. ISBN: 0-321-24677-2. [3] Anne Bennett and Michael J. Assels. Computer security at Concordia: Past problems, proposed plans. [online], 1995. http://alcor.concordia.ca/nonalcor/ssg/contributions/security-report/main.html. [4] Brian Berliner, david d `zoo' zuhn, Je� Polk, Larry Jones, Derek Robert Price, Mark D. Baushke, et al. Concurrent Versions System (CVS). [online], 1989-2011. http://savannah.nongnu.org/projects/cvs/. [5] Marc Blanchet. Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed Networks. John Wiley & Sons Ltd., 2006. ISBN: 978-0471-49892-6, http://www.ipv6book.ca/. [6] David N. Blank-Edelman. Perl for System Administration. O'Reilly, 2000. ISBN: 1-56592-609-9. [7] Wesley J. Chun. Core Python Programming. Pearson Education, Inc., 2 edition, 2007. ISBN: 1-56592-609-9. [8] Cisco. Spanning tree protocol (STP). [online], 2011. http://www.cisco.com/en/US/tech/tk389/ tk621/tsd_technology_support_protocol_home.html/. [9] Cisco Systems, Inc. Catalyst 2950 Switch Hardware Installation Guide, October 2003. [10] Kennedy Clark and Kevin Hamilton. Cisco LAN Switching. Cisco Press, 1999. ISBN: 1-57870-094-9. [11] Sheila Frankel, Richard Graveman, John Pearce, and Mark Rooks. Guidelines for the secure de- ployment of IPv6. Technical Report Special Publication 800-119, NIST, December 2010. http: //csrc.nist.gov/publications/nistpubs/800-119/sp800-119.pdf. [12] Je�rey E. F. Friedl. Mastering Regular Expression: Powerful Techniques for Perl and Other Tools. O'Reilly, 1997. ISBN: 1-56592-257-3. [13] Eric Gamess and Neudith Morales. Implementing IPv6 at Central University of Venezuela. In Pro- ceedings of the 4th international IFIP/ACM Latin American conference on Networking (LANC'07), pages 43{51, New York, NY, USA, 2007. ACM. [14] Craig Hunt. TCP/IP Network Administration. O'Reilly, 1993. ISBN: 0-937175-82-X. [15] Leszek Lilien, Adawia Al-Alawneh, and Lot� Ben Othmane. The pervasive trust foundation for security in next generation networks. In NSPW'10, pages 129-141. ACM, September 2010. A Position Paper. [16] Thomas A. Limoncelli and Christine Hogan. The Practice of System and Network Administration. Addison-Wesley, 2002. ISBN: 0-201-70271-1. [17] Douglas R. Mauro and Kevin J. Schmidt. Essential SNMP. O'Reilly, 2001. ISBN: 0-596-00020-00. [18] Eric Miller, Bill Fenner, Oliver Gorwits, Jeroen van Ingen, Max Baker, and the Netdisco Community. NETDISCO - network management tool. [online], 2009{2011. http://netdisco.org/. [19] Tobi Oetiker, Dave Rand, and the MRTG Community. Tobi oetiker's MRTG - the Multi Router Traffc Grapher. [online], 2008-2011. http://oss.oetiker.ch/mrtg/. [20] Radia Perlman. An algorithm for distributed computation of a spanning tree in an extended lan. SIGCOMM Comput. Commun. Rev., 15:44-53, September 1985. [21] Gregor N. Purdy. Linux iptables: Pocket Reference. O'Reilly, 2004. ISBN: 978-0-596-00569-6. [22] QoSient, LLC. Argus: Auditing network activity. [online], 2000-2011. http://www.qosient.com/argus/. [23] Michael Rash. Linux Firwalls: Attack Detection and Response with iptables, psad, and fwsnort. No Starch Press, Inc., San Francisco, 3 edition, 2007. ISBN: 978-1-59327-141-1. [24] Aviel D. Rubin. White-hat Security Arsenal: Tackling the Threats. Addison-Wesley Longman Ltd., Essex, UK, 2001. [25] Carla Schroder. Linux Networking Cookbook. O'Reilly, 2008. ISBN: 978-0-596-10248-7. [26] Randal L. Schwartz and Tom Phoenix. Learning Perl Objects, References and Modules. O'Reilly, 2003. ISBN: 0-596-00478-8. [27] Jordan Sissel. Making iptables changes atomically and not dropping packets. [online], March 2010. http://www.semicomplete.com/blog/geekery/ atomic-iptables-changes-and-not-dropping-packets.html. [28] Source�re. Snort: Open-source network intrusion prevention and detection system (IDS/IPS). [on- line], 2010. http://www.snort.org/. [29] William Stallings. SNMP, SNMPv2, SNMPv3, and RMON 1 and 2. Addison-Wesley, 3 edition, 1999. ISBN: 0-201-48534-6. [30] Richard Stallman, Roland McGrath, Paul Smith, and the GNU Project. GNU Make. Free Software Foundation, Inc., [online], 1997-2006. http://www.gnu.org/software/make/. [31] Lincoln D. Stein. Network Programming with Perl. Addison-Wesley, 2001. ISBN: 0-201-61571-1. [32] Mani Subramanian. Network Management: Principles and Practice. Addison-Wesley, 2000. ISBN: 0-201-35742-9. [33] Steve Suehring and Robert L. Ziegler. Linux Firwalls. Pearson Education, Inc. and Novell Press, 3 edition, 2006. ISBN: 978-0-672-32771-1. [34] Tenable Network Security. Nessus: the network vulnerability scanner. [online], 2002-2011. http://www.nessus.org/nessus/. [35] The IPv6 Experts. The IPv6 experts .net: Your black and white guide to the new internet. [online], 2010. http://www.theipv6experts.net. [36] The OpenNMS Community. The OpenNMS project. [online], 1999-2011. http://www.opennms.org/. [37] The PostgreSQL Global Development Group. PostgreSQL { the world's most advanced open-source database. [ditigal], 1996{2011. http://www.postgresql.org/, last viewed January 2010. [38] Wikipedia. Spanning tree protocol | Wikipedia, the free encyclopedia, 2010. [on-line; accessed 13-December-2010], http://en.wikipedia.org/w/index.php?title=Spanning_ tree_protocol&oldid=397364209.