Network monitoring, access control, and booby traps using TCP Wrappers Anthony Pell 1 min read Nov 23, 2004 This documentation will be introducing you to the whole concept surrounding the working of TCP Wrappers. Network monitoring, access control, and booby traps using TCP Wrappers Prev: The Five-Access Point Security Plan Next: IP Spoofing