Evading IDS, Firewalls and Detecting Honeypots
Publication Type:
Book ChapterSource:
Ethical hacking and countermeasures: Secure Network Operating Systems and Infrastructures, Cengage Learning, Boston, USA, p.77-134 (2016)- 4051 reads
- Google Scholar
- RTF
- EndNote XML