Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation

You might also like...