Systems for Detecting Network Intrusion
From Computing and Software Wiki
(Difference between revisions)
| Line 1: | Line 1: | ||
| - | [[ | + | [[Communications and Computer Network Protocol Design Models]] |
[[network stack (dod): What each layer does - attack patterns on each layer - & how to defend it]] | [[network stack (dod): What each layer does - attack patterns on each layer - & how to defend it]] | ||
Revision as of 23:39, 22 March 2008
Communications and Computer Network Protocol Design Models
network stack (dod): What each layer does - attack patterns on each layer - & how to defend it
