BRKSEC-2003 - IPv6 Security Threats and Mitigations
ALTTC BSNL. 1. Introduction 2. Transition Techniques 3. Security issues 4. Cost Estimation 5. Transition cost and penetration curve 6. Theoretical consideration.
Giving the Heave-Ho to Worms, Spyware, and Bots! Tammy L Clark, CISSP, CISM, CISA CISO, Georgia State University William Monahan, CISSP, CISA, CISM Information.