Network stack (dode) - attack patterns on each layer & how to defend it

From Computing and Software Wiki

Revision as of 18:07, 22 March 2008 by Khalats (Talk)
Jump to: navigation, search

We are talking about the dode model here:

Personal tools