Evading IDS, Firewalls and Detecting Honeypots

Publication Type:

Book Chapter

Authors:

Source:

Ethical hacking and countermeasures: Secure Network Operating Systems and Infrastructures, Cengage Learning, Boston, USA, p.77-134 (2016)
Share/Save
Last updated: Thursday, 08 October 2020