May 2018
Intermediate to advanced
326 pages
8h 32m
English
In the networking world, imagine a situation where attackers plug their cable into your network, establish a Border Gateway Protocol (BGP) session, and sniff all the data going into the wire. This is not limited to sniffing your information, but you can cause a lot of trouble for others.
For example:
Read now
Unlock full access