Kaeo, 2007 - Google Patents
Operational Security Current Practices in Internet Service Provider EnvironmentsKaeo, 2007
View HTML- Document ID
- 13009615014981567683
- Author
- Kaeo M
- Publication year
External Links
Snippet
RFC 4778: Operational Security Current Practices in Internet Service Provider
Environments [RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Errata] [Info page]
INFORMATIONAL Errata Exist Network Working Group M. Kaeo Request for Comments …
- 210000003702 immature single positive T cell 0 description 63
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Long et al. | Trends in denial of service attack technology | |
Chakrabarti et al. | Internet infrastructure security: A taxonomy | |
US9088581B2 (en) | Methods and apparatus for authenticating an assertion of a source | |
Geva et al. | Bandwidth distributed denial of service: Attacks and defenses | |
Bellovin | A look back at" security problems in the tcp/ip protocol suite | |
US20030014665A1 (en) | Apparatus and method for secure, automated response to distributed denial of service attacks | |
WO2002101516A2 (en) | Method and apparatus for distributed network security | |
Hussein et al. | Software-Defined Networking (SDN): the security review | |
Schneider | The state of network security | |
Alabady | Design and Implementation of a Network Security Model for Cooperative Network. | |
Fang | Security Framework for Provider-Provisioned Virtual Private Networks (PPVPNs) | |
Ghorbani et al. | Network attacks | |
Kaeo | Operational Security Current Practices in Internet Service Provider Environments | |
Jones | Operational Security Requirements for Large Internet Service Provider (ISP) IP Network Infrastructure | |
JP2006501527A (en) | Method, data carrier, computer system, and computer program for identifying and defending attacks against server systems of network service providers and operators | |
Haeberlen et al. | Pretty Good Packet Authentication. | |
Pandey et al. | Comprehensive security mechanism for defending cyber attacks based upon spoofing and poisoning | |
Keromytis et al. | Designing firewalls: A survey | |
Sarvepalli | Designing Network Security Labs | |
Μπαξεβάνος | Protecting with network security strategies a medium size enterprise and implementing scenarios attacks and countermeasures on cisco equipment | |
Hongach Jr | Mitigating security flaws in the tcp/ip protocol suite | |
PRICE et al. | Network security mechanisms utilizing dynamic network address translation ldrd project | |
Ali et al. | Design and implementation of a secured remotely administrated network | |
Sulaman | An Analysis and Comparison of The Security Features of Firewalls and IDSs | |
Jones | RFC 3871: Operational Security Requirements for Large Internet Service Provider (ISP) IP Network Infrastructure |