Protocol Selection Criteria
By
Tom Markham
Dr. Dobb's Journal
June 1997
Figure 3: Example network showing the potential for spoofing source addresses.
Back to Article
Copyright © 1997, Dr. Dobb's Journal