In this text, Jacobson examines various network protocols, focusing on vulnerabilities, exploits, and methods to mitigate an attack. While most books on this subject focus on cryptographic techniques to mitigate attacks, this volume recognizes the limitations of this methodology and considers a wider range of security problems and solutions.
Read More
In this text, Jacobson examines various network protocols, focusing on vulnerabilities, exploits, and methods to mitigate an attack. While most books on this subject focus on cryptographic techniques to mitigate attacks, this volume recognizes the limitations of this methodology and considers a wider range of security problems and solutions.
Read Less