August 2000
Intermediate to advanced
800 pages
21h 5m
English
In this chapter
To protect your computer from outside intrusions, you must first know a little about how communication takes place. Because the Internet has become so popular through both email and the World Wide Web, most networks and standalone computers use TCP/IP as the protocol of choice.
In this chapter, I discuss how the Transmission Control Protocol ...