Introduction to Network Security (Chapman & Hall/CRC Computer and Information Science Series Book 19)
Douglas Jacobsonamazon.com
Introduction to Network Security (Chapman & Hall/CRC Computer and Information Science Series Book 19)
Design Vulnerability Implementation Vulnerability Configuration Vulnerability
Internet service provider (ISP).
destination. This discovery protocol can be a source of attack, which will be discussed in Part II of the book.