Ebook Hack the stack - Using snort and ethereal to master the 8 layers of an insecure network: Part 2

Ebook Hack the stack - Using snort and ethereal to master the 8 layers of an insecure network Part 2 includes contents: Chapter 6 Layer 5: The session layer, Chapter 7 Layer 6: The presentation layer, Chapter 8 Layer 7: The application layer, Chapter 9 Layer 8: The people layer, Appendix A Risk mitigation: Securing the stack.