CHAPTER 5
DATA COMMUNICATIONS AND INFORMATION SECURITY
Raymond Panko
5.2.3 Firm's Wide Area Networks (WANs)
5.3 NETWORK PROTOCOLS AND VULNERABILITIES
5.4.2 Layered Standards Architectures
5.4.3 Single-Network Standards
5.4.4 Internetworking Standards
5.6 TRANSMISSION CONTROL PROTOCOL (TCP)
5.6.1 Connection-Oriented and Reliable Protocol
5.6.4 Octets and Sequence Number
5.8 TCP/IP SUPERVISORY STANDARDS
5.8.1 Internet Control Message Protocol (ICMP)
5.8.2 Domain Name System (DNS)
5.8.3 Dynamic Host Configuration Protocol (DHCP)
5.8.4 Dynamic Routing Protocols
5.8.5 Simple Network Management Protocol (SNMP)
5.9.4 Other Application Standards
5.1 INTRODUCTION.
Sometimes, an attacker can simply walk up to a target computer. In most cases, however, attackers must use networks to reach their targets. Some attacks even aim at networks, trying to bring down local area networks, wide area networks, and even the global Internet. This chapter provides an overview ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.