Bibliographic Reference: |
Cheilas, K., Vakaloudis, A., & Politis, A. (2015). Simulation of network perimeter security design (Firewalls, DMZ, Access Lists) [Chapter]. In Cheilas, K., Vakaloudis, A., & Politis, A. 2015. Computer Networks - Laboratory Exercises [Laboratory Guide]. Kallipos, Open Academic Editions. https://hdl.handle.net/11419/1772
|