At 12:28 AM +0000 8/25/03, Marko Milivojevic wrote: > > Yet when I go through the SAFE documentation, I find: >> 7 Axioms of types of targets (p. 5 of PDF) >> 3 Types of Expected Threats (p. 10) >> 3 separate validation services for remote user access (p. 30) >> 12 elements of the taxonomy of network attacks (p. 56), some of >> which are actually host attacks. >> >> No number that is four. > > Uhm, this is 4-items list... ;-) > > >Marko.
/Indiana Jones voice "Recursion. Why does it always have to be recursion?" /*Indiana Jones voice Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=74321&t=74304 -------------------------------------------------- **Please support GroupStudy by purchasing from the GroupStudy Store: http://shop.groupstudy.com FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html