[Naka09]
S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” May 2009, [Online]. Available: http://www.bitcoin.org/bitcoin.pdf
[Blac24]
“Black hat (computer security),” Wikipedia. Jan. 15, 2024. Accessed: Jan. 15, 2024. [Online]. Available: https://en.wikipedia.org/w/index.php?title=Black_hat_(computer_security)&oldid=1195823377
[Mart08]
R. C. Martin, Clean Code: A Handbook of Agile Software Craftsmanship. Pearson Education, 2008. [Online]. Available: https://books.google.de/books?id=_i6bDeoCQzsC
[Clic00]
“Clickjacking | OWASP Foundation.” https://owasp.org/www-community/attacks/Clickjacking (accessed Jan. 15, 2024).
[VaPa03]
A. Vakali and G. Pallis, “Content delivery networks: status and trends,” IEEE Internet Computing, vol. 7, no. 6, pp. 68–74, 2003, doi: 10.1109/MIC.2003.1250586.
[Cont23]
“Content management system,” Wikipedia. Dec. 22, 2023. Accessed: Jan. 15, 2024. [Online]. Available: https://en.wikipedia.org/w/index.php?title=Content_management_system&oldid=1191227048
[Cros00]
“Cross Site Scripting (XSS) | OWASP Foundation.” https://owasp.org/www-community/attacks/xss/ (accessed Jan. 17, 2024).
[ClKn10]
R. A. Clarke and R. Knake, Cyber War: The Next Threat to National Security and What to Do About It. HarperCollins, 2010. [Online]. Available: https://books.google.de/books?id=KOtxx_eWQCwC
[Wind05]
P. J. Windley, Digital Identity. O’Reilly Media, 2005. [Online]. Available: https://books.google.de/books?id=WTmbAgAAQBAJ
[Vinc22]
W. S. Vincent, Django for APIs: Build web APIs with Python and Django. WelcomeToCode, 2022. [Online]. Available: https://books.google.de/books?id=0VxwDwAAQBAJ
[Vinc22]
W. S. Vincent, Django for Professionals. Independently Published, 2022. [Online]. Available: https://books.google.de/books?id=0uqjDwAAQBAJ
[Dmz(24]
“DMZ (computing),” Wikipedia. Jan. 04, 2024. Accessed: Jan. 24, 2024. [Online]. Available: https://en.wikipedia.org/w/index.php?title=DMZ_(computing)&oldid=1193489998
[Andr19]
J. Andress, Foundations of Information Security: A Straightforward Introduction. No Starch Press, 2019. [Online]. Available: https://books.google.de/books?id=rFmSDwAAQBAJ
[Free00]
“FreeBSD Manual Pages.” https://man.freebsd.org/cgi/man.cgi (accessed Jan. 15, 2024).
[Grey23]
“Grey hat,” Wikipedia. Aug. 04, 2023. Accessed: Jan. 15, 2024. [Online]. Available: https://en.wikipedia.org/w/index.php?title=Grey_hat&oldid=1168732090
[Bhar16]
A. Bhargava, Grokking Algorithms: An illustrated guide for programmers and other curious people. Manning, 2016. [Online]. Available: https://books.google.de/books?id=yzkzEAAAQBAJ
[Ward14]
B. Ward, How Linux Works, 2nd Edition: What Every Superuser Should Know. No Starch Press, 2014. [Online]. Available: https://books.google.de/books?id=fP5WBQAAQBAJ
[Resc00]
E. Rescorla, “HTTP Over TLS,” Internet Engineering Task Force, Request for Comments RFC 2818, May 2000. doi: 10.17487/RFC2818.
[Auth00]
auth0.com, “JWT.IO - JSON Web Tokens Introduction.” http://jwt.io/ (accessed Jan. 18, 2024).
[Cart03]
G. Carter, LDAP System Administration: Putting Directories to Work. O’Reilly Media, 2003. [Online]. Available: https://books.google.de/books?id=utsMgEfnPSEC
[NeBr12]
C. Negus and C. Bresnahan, Linux Bible. Wiley, 2012. [Online]. Available: https://books.google.de/books?id=pdgJ3HIgSHEC
[KiDa00]
O. Kirch and T. Dawson, Linux Network Administrator’s Guide. O’Reilly, 2000. [Online]. Available: https://books.google.de/books?id=5bgEyjAtLhEC
[Meta00]
“Metasploit | Penetration Testing Software, Pen Testing Security,” Metasploit. https://www.metasploit.com/ (accessed Jan. 15, 2024).
[Simp15]
Module 5: Demilitarized Zone (DMZ), (Mar. 02, 2015). Accessed: Jan. 24, 2024. [Online Video]. Available: https://www.youtube.com/watch?v=rztA1D5h_Ec
[Offi00]
“Official PCI Security Standards Council Site,” PCI Security Standards Council. https://www.pcisecuritystandards.org/ (accessed Jan. 17, 2024).
[GaPa08]
J. Gadge and A. A. Patil, “Port scan detection,” in 2008 16th IEEE International Conference on Networks, 2008, pp. 1–6. doi: 10.1109/ICON.2008.4772622.
[Posi24]
“POSIX,” Wikipedia. Jan. 12, 2024. Accessed: Jan. 29, 2024. [Online]. Available: https://en.wikipedia.org/w/index.php?title=POSIX&oldid=1195053804
[Prog23]
“Progressive web apps | MDN,” Oct. 25, 2023. https://developer.mozilla.org/en-US/docs/Web/Progressive_web_apps (accessed Jan. 15, 2024).
[Matt23]
E. Matthes, Python Crash Course, 3rd Edition. No Starch Press, 2023. [Online]. Available: https://books.google.fr/books?id=TtOQEAAAQBAJ
[Redt23]
“Red team,” Wikipedia. Oct. 04, 2023. Accessed: Jan. 15, 2024. [Online]. Available: https://en.wikipedia.org/w/index.php?title=Red_team&oldid=1178606276
[Maha22]
A. Maharjan, “Reverse proxy,” A. Maharjan, Dec. 26, 2022. https://amaharjan.de/reverse-proxy/ (accessed Jan. 15, 2024).
[HGAW15]
P. Hunt, K. Grizzle, M. Ansari, E. Wahlstroem, and C. Mortimore, “System for Cross-domain Identity Management: Protocol,” Internet Engineering Task Force, Request for Comments RFC 7644, Sep. 2015. doi: 10.17487/RFC7644.
[NHRY05]
C. Neuman, S. Hartman, K. Raeburn, and T. Yu, “The Kerberos Network Authentication Service (V5),” Internet Engineering Task Force, Request for Comments RFC 4120, Jul. 2005. doi: 10.17487/RFC4120.
[LoYl06]
C. M. Lonvick and T. Ylonen, “The Secure Shell (SSH) Protocol Architecture,” Internet Engineering Task Force, Request for Comments RFC 4251, Jan. 2006. doi: 10.17487/RFC4251.
[Resc18]
E. Rescorla, “The Transport Layer Security (TLS) Protocol Version 1.3,” Internet Engineering Task Force, Request for Comments RFC 8446, Aug. 2018. doi: 10.17487/RFC8446.
[U.s.00]
“U.S.C. Title 44 - PUBLIC PRINTING AND DOCUMENTS.” https://www.govinfo.gov/content/pkg/USCODE-2008-title44/html/USCODE-2008-title44-chap35-subchapIII.htm (accessed Jan. 17, 2024).
[BeFM05]
T. Berners-Lee, R. T. Fielding, and L. M. Masinter, “Uniform Resource Identifier (URI): Generic Syntax,” Internet Engineering Task Force, Request for Comments RFC 3986, Jan. 2005. doi: 10.17487/RFC3986.
[W3sc00]
“W3Schools Online Web Tutorials.” https://www.w3schools.com/ (accessed Jan. 15, 2024).
[Mcdo20]
M. McDonald, Web Security for Developers: Real Threats, Practical Defense. No Starch Press, 2020. [Online]. Available: https://books.google.de/books?id=ACVaxQEACAAJ
[What00]
“What are Computer Viruses? | Definition & Types of Viruses,” Fortinet. https://www.fortinet.com/resources/cyberglossary/computer-virus (accessed Jan. 19, 2024).
[What00]
“What is a Backdoor Attack? Tips for Detection and Prevention | Definition from TechTarget,” Security. https://www.techtarget.com/searchsecurity/definition/back-door (accessed Jan. 15, 2024).
[What00]
“What Is Apache Tomcat? | JRebel by Perforce.” https://www.jrebel.com/blog/what-is-apache-tomcat (accessed Jan. 16, 2024).
[What23]
“What is DevSecOps?,” 2023. https://www.redhat.com/en/topics/devops/what-is-devsecops (accessed Jan. 19, 2024).
[What00]
“What is identity management (ID management)? Definition from SearchSecurity,” Security. https://www.techtarget.com/searchsecurity/definition/identity-management-ID-management (accessed Jan. 15, 2024).
[What00]
“What is Remote Code Execution (RCE)? | Definition from TechTarget,” SearchWindowsServer. https://www.techtarget.com/searchwindowsserver/definition/remote-code-execution-RCE (accessed Jan. 15, 2024).
[Whit23]
“White hat (computer security),” Wikipedia. Dec. 30, 2023. Accessed: Jan. 15, 2024. [Online]. Available: https://en.wikipedia.org/w/index.php?title=White_hat_(computer_security)&oldid=1192710030
[Xmlb00]
“XML Bomb Security Testing | SoapUI.” https://www.soapui.org/docs/security-testing/security-scans/xml-bomb/ (accessed Jan. 15, 2024).