Difference between revisions of "MOOC:Activité 35"

From Livre IPv6

(Références)
(Références)
Line 8: Line 8:
 
Caicedo, C.; Joshi, J. et Tuladhar, S. (2009). IEEE Computer, Vol. 42, No. 2, February.  
 
Caicedo, C.; Joshi, J. et Tuladhar, S. (2009). IEEE Computer, Vol. 42, No. 2, February.  
 
IPv6 Security Challenges.
 
IPv6 Security Challenges.
 +
 +
* [http://bcop.nanog.org/index.php/IPv6_Security_Myths NANOG BCOP (draft) IPv6 Security Myths]

Revision as of 12:31, 20 April 2016


Références

Attacking IPV6 Implementation using Fragmentation]) voir aussi RFC 7739

Caicedo, C.; Joshi, J. et Tuladhar, S. (2009). IEEE Computer, Vol. 42, No. 2, February. IPv6 Security Challenges.

Personal tools