𝔖 Bobbio Scriptorium
✦   LIBER   ✦

II. Method Overview

✍ Scribed by Daniel R. Anderson; Aletha C. Huston; Kelly L. Schmitt; Deborah L. Linebarger; John C. Wright


Book ID
110690651
Publisher
John Wiley and Sons
Year
2001
Tongue
English
Weight
131 KB
Volume
66
Category
Article
ISSN
0037-976X

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Sage II: An overview
✍ M.P. McCormick πŸ“‚ Article πŸ“… 1987 πŸ› Elsevier Science 🌐 English βš– 529 KB
Trefftz method: an overview
✍ Eisuke Kita; Norio Kamiya πŸ“‚ Article πŸ“… 1995 πŸ› Elsevier Science 🌐 English βš– 1004 KB
An overview of network evasion methods
✍ Brian Hernacki; Jeremy Bennett; James Hoagland πŸ“‚ Article πŸ“… 2005 πŸ› Elsevier Science 🌐 English βš– 244 KB

In recent years much attention has been paid in the network security space to a variety of issues including performance and detection capability. Resistance to evasion however has not been pursued with the same level of interest. During this time many of the technologies have evolved. New applicatio