000 | 02708nam a22005175i 4500 | ||
---|---|---|---|
001 | 978-1-4614-9491-1 | ||
003 | DE-He213 | ||
005 | 20200421112226.0 | ||
007 | cr nn 008mamaa | ||
008 | 131104s2014 xxu| s |||| 0|eng d | ||
020 |
_a9781461494911 _9978-1-4614-9491-1 |
||
024 | 7 |
_a10.1007/978-1-4614-9491-1 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aYu, Shui. _eauthor. |
|
245 | 1 | 0 |
_aDistributed Denial of Service Attack and Defense _h[electronic resource] / _cby Shui Yu. |
264 | 1 |
_aNew York, NY : _bSpringer New York : _bImprint: Springer, _c2014. |
|
300 |
_aX, 97 p. 16 illus., 8 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Computer Science, _x2191-5768 |
|
505 | 0 | _aAn Overview of DDoS Attacks -- Malicious Networks for DDoS Attacks -- DDoS Attack Detection -- Attack Source Traceback -- DDoS Attack and Defence in Cloud -- Future Work. | |
520 | _aThis brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also supplies an overview of DDoS attack issues, DDoS attack detection methods, DDoS attack source traceback, and details on how hackers organize DDoS attacks. The author concludes with future directions of the field, including the impact of DDoS attacks on cloud computing and cloud technology. The concise yet comprehensive nature of this brief makes it an ideal reference for researchers and professionals studying DDoS attacks. It is also a useful resource for graduate students interested in cyberterrorism and networking. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aComputers. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
650 | 2 | 4 | _aInformation Systems and Communication Service. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9781461494904 |
830 | 0 |
_aSpringerBriefs in Computer Science, _x2191-5768 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-1-4614-9491-1 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c57673 _d57673 |