next up previous
Next: Slide 16 Up: Network Security Previous: Slide 14

Internet Security Requirements/Threats

And all this with postcards (IP datagrams)!



Sridhar Iyer
2001-01-08