Answer the question
In order to leave comments, you need to log in
What network attacks are possible at the data link layer (OSI). In which direction is it better to start digging?
maybe there are resources other than Tanenbaum and Oliferov? =\
I somehow need it more purposefully.
It seems that I got the most boring topic =\
Answer the question
In order to leave comments, you need to log in
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question