The top documents of fred-cohen
A04249_F_ch36PPT
109 views
A secure computer network design
214 views
Internet holes — Part 13: The SYN flood
217 views
Internet holes — Part 8: Spam
213 views
Internet holes — Part 10: UDP viruses
219 views
Intrusion detection and response
213 views