Knowledge Resources | Dar Al-hikmah Library | Public Access
Subject(s): Dissertations, Academic -- Department of Communication Engineering -- IIUM Summary: The Internet attack has been made possible by lack of source authentication in the IP protocol. The nature of identifying the internet attacker has been made difficult because of the open, trusting nature of the protocol which makes it possible for a