Network stack (dode) - attack patterns on each layer & how to defend it
From Computing and Software Wiki
(Difference between revisions)
(New page: We are t) |
|||
Line 1: | Line 1: | ||
- | We are | + | We are talking about the dode model here: |
Revision as of 18:07, 22 March 2008
We are talking about the dode model here: