[1.] Wow Essay (2009), Top Lycos Networks, Available at: http://www.wowessays.com/ dbase/ab2/ nyr90.shtml, Visited: 28/01/2012.
[2.] Bowen, Mace (2009), Computer Crime, Available at: http://www.guru.net/, Visited: 28/01/2012.
[3.] CAPEC (2010), CAPEC-117: Data Interception Attacks, Available at : http : // capec . mitre.org/data/definitions/117.html, Visited: 28/01/2012.