Fingerprinting Software Defined Networks and Controllers by Air Force Institute
29,32 €
The attacker can also communicate to other end hosts on the network, including a host that is another point of presence for the attacker (i.e., the attacker can have two points of presence on the network to communicate between).
Jetzt bei Ebay: