TCP/IP Networking

  • David J. Marchette
Part of the Statistics for Engineering and Information Science book series (ISS)


This chapter is intended to provide an overview of networking and the protocols that are most often used for attacks. This should provide the background needed to understand network data and the various attacks described in the following chapters.


Transmission Control Protocol Port Number User Datagram Protocol Transmission Control Protocol Connection Domain Name Service 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media New York 2001

Authors and Affiliations

  • David J. Marchette
    • 1
  1. 1.Naval Surface Warfare CenterDahlgrenUSA

Personalised recommendations