Li et al., 1995 - Google Patents
Security issues with TCP/IPLi et al., 1995
View PDF- Document ID
- 15797726592947007110
- Author
- Li R
- Unger E
- Publication year
- Publication venue
- ACM SIGAPP Applied Computing Review
External Links
Snippet
An introduction to network security, basic definitions and aa brief discussion of the architecture of TCP/IP as well as the Open System Intercornnection (OSI) Reference Model open the paper. The relationship between TCP/IP and of some OSI layers is described. An …
- 235000010384 tocopherol 0 title abstract description 54
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Oppliger | Internet and intranet security | |
US10652210B2 (en) | System and method for redirected firewall discovery in a network environment | |
Rescorla et al. | Guidelines for writing RFC text on security considerations | |
Cheswick | Firewalls And Internet Security: Repelling The Wily Hacker, 2/E | |
US6751728B1 (en) | System and method of transmitting encrypted packets through a network access point | |
US5983350A (en) | Secure firewall supporting different levels of authentication based on address or encryption status | |
CA2437548A1 (en) | Apparatus and method for providing secure network communication | |
GB2317792A (en) | Virtual Private Network for encrypted firewall | |
Joshi | Network security: know it all | |
US10313305B2 (en) | Method of unblocking external computer systems in a computer network infrastructure, distributed computer network having such a computer network infrastructure as well as computer program product | |
Li et al. | Security issues with TCP/IP | |
Rhee | Wireless Mobile Internet Security | |
Cisco | Cisco IOS Security Configuration Guide Release 12.1 | |
Burns et al. | Implementing Address Assurance in the Intel IXP Router | |
Reid | Plugging the holes in host-based authentication | |
Richardson | The development of a database taxonomy of vulnerabilities to support the study of denial of service attacks | |
Rescorla et al. | RFC3552: Guidelines for Writing RFC Text on Security Considerations | |
Lobo et al. | CCIE Security V4. 0 Quick Reference | |
Smyth | Security+ Essentials | |
Bellovin | Security Problems in the ТСРЯР Protocol Suite | |
Qureshi | Network intrusion detection using an innovative statistical approach | |
Iyer | B. Tech. Seminar UNIX and Internet Security | |
Harris | Firewalls and virtual private networks | |
Fan | A survey of the Internet security and firewalls and strengthening the security on the CS Internetwork at the University of Nevada, Reno | |
Boshoff | Securing Host and Application Information in the TCP/IP Protocol Suite |