Network stack (dode) - attack patterns on each layer & how to defend it

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
(New page: We are t)
Line 1: Line 1:
-
We are t
+
We are talking about the dode model here:

Revision as of 18:07, 22 March 2008

We are talking about the dode model here:

Personal tools