114 䡲 Cyber Forensics Field Manual, Second Edition
3. Kessler, G. (April 13, 2006), An Overview of Cryptography, www.garykessler.net/library/crypto.
html, www.garykessler.net, retrieved July 2006, used with permission.
4. Tanase, M. (March 11, 2003), IP Spoofi ng: An Introduction, www.securityfocus.com/infocus/1674,
retrieved August 2006.
5. DARPA, 1981a. Internet Program, Protocol Specifi cation, September 1981, prepared for, Defense
Advanced Research Projects Agency, Information Processing Techniques Offi ce, 1400 Wilson
Boulevard, Arlington, Virginia22209, Information Sciences Institute University of Southern
California, 4676 Admiralty Way, Marina del Rey, California90291, September 1981, www.faqs.org/
rfcs/rfc791.html, retrieved Augu ...