GREGG, M. C., & WATKINS, S. (2006). Hack the stack: Using Snort and Ethereal to master the 8 layers of an insecure network. Rockland, MA: a unique and refreshing look at network security Syngress.
Chicago Style CitationGREGG, Michael C., and Stephen WATKINS. Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network. Rockland, MA: a unique and refreshing look at network security Syngress, 2006.
MLA CitationGREGG, Michael C., and Stephen WATKINS. Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network. Rockland, MA: a unique and refreshing look at network security Syngress, 2006.
Warning: These citations may not always be 100% accurate.