This chapter is intended to provide an overview of networking and the protocols that are most often used for attacks. This should provide the background needed to understand network data and the various attacks described in the following chapters.
KeywordsTransmission Control Protocol Port Number User Datagram Protocol Transmission Control Protocol Connection Domain Name Service
Unable to display preview. Download preview PDF.