Chapter Download

Extending OSI to Network Security -- Chapter 1 of 'Hack the Stack'

    Requires Free Membership to View

About this chapter: Extending OSI to Network Security covers topics such as common stack attacks, mapping the OSI model to the TCP/IP model, and talks about the current state of IT security. The goal of this chapter is to take the well-known Open Systems Interconnect (OSI) model and use it to present security topics in a new and unique way.

About this book: Hack the Stack was written for those who seek to better understand and to gain a deeper knowledge of how TCP/IP systems really work. Such knowledge enables security professionals to make networks more secure.

Read the rest of Extending OSI to Network Security in this PDF.

Excerpted from Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of An Insecure Network by Michael Gregg (ISBN: 1597491098). Copyright 2006, Syngress Publishing. All rights reserved.

This was first published in November 2006

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: