Figure 8.13  The TCP three-way handshake inhibits simple spoofing