At 12:28 AM +0000 8/25/03, Marko Milivojevic wrote:
>  > Yet when I go through the SAFE documentation, I find:
>>       7 Axioms of types of targets (p. 5 of PDF)
>>       3 Types of Expected Threats (p. 10)
>>       3 separate validation services for remote user access (p. 30)
>>      12 elements of the taxonomy of network attacks (p. 56), some of
>>         which are actually host attacks.
>>
>>  No number that is four.
>
>     Uhm, this is 4-items list... ;-)
>
>
>Marko.

/Indiana Jones voice
"Recursion. Why does it always have to be recursion?"
/*Indiana Jones voice




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=74321&t=74304
--------------------------------------------------
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html

Reply via email to