APA Citation

GREGG, M. C., & WATKINS, S. (2006). Hack the stack: Using Snort and Ethereal to master the 8 layers of an insecure network. Rockland, MA: a unique and refreshing look at network security Syngress.

Chicago Style Citation

GREGG, Michael C., and Stephen WATKINS. Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network. Rockland, MA: a unique and refreshing look at network security Syngress, 2006.

MLA Citation

GREGG, Michael C., and Stephen WATKINS. Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network. Rockland, MA: a unique and refreshing look at network security Syngress, 2006.

Warning: These citations may not always be 100% accurate.