Distributed Denial of Service Attack and Defense Distributed Denial of Service Attack and Defense
SpringerBriefs in Computer Science

Distributed Denial of Service Attack and Defense

    • ‏39٫99 US$
    • ‏39٫99 US$

وصف الناشر

This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also supplies an overview of DDoS attack issues, DDoS attack detection methods, DDoS attack source traceback, and details on how hackers organize DDoS attacks. The author concludes with future directions of the field, including the impact of DDoS attacks on cloud computing and cloud technology. The concise yet comprehensive nature of this brief makes it an ideal reference for researchers and professionals studying DDoS attacks. It is also a useful resource for graduate students interested in cyberterrorism and networking.

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠١٣
٤ نوفمبر
اللغة
EN
الإنجليزية
عدد الصفحات
١٠٧
الناشر
Springer New York
البائع
Springer Nature B.V.
الحجم
١٫٥
‫م.ب.‬
Botnet Detection Botnet Detection
٢٠٠٧
Dynamic Networks And Cyber-security Dynamic Networks And Cyber-security
٢٠١٦
Cyber Threat Intelligence Cyber Threat Intelligence
٢٠١٨
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
٢٠٢٠
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
٢٠٢١
Advances in Cyber Security Advances in Cyber Security
٢٠٢١
Intelligent Industrial Internet Systems Intelligent Industrial Internet Systems
٢٠٢٣
Tools for Design, Implementation and Verification of Emerging Information Technologies Tools for Design, Implementation and Verification of Emerging Information Technologies
٢٠٢٣
Security and Privacy in Federated Learning Security and Privacy in Federated Learning
٢٠٢٣
Machine Learning Empowered Intelligent Data Center Networking Machine Learning Empowered Intelligent Data Center Networking
٢٠٢٣
Privacy Preservation in IoT: Machine Learning Approaches Privacy Preservation in IoT: Machine Learning Approaches
٢٠٢٢
Personalized Privacy Protection in Big Data Personalized Privacy Protection in Big Data
٢٠٢١
Introduction to Ethical Software Development Introduction to Ethical Software Development
٢٠٢٥
Digital Image Forgery Detection Digital Image Forgery Detection
٢٠٢٥
Blockchain Without Barriers Blockchain Without Barriers
٢٠٢٥
Human Reconstruction Using mmWave Technology Human Reconstruction Using mmWave Technology
٢٠٢٥
Intelligent Localization for Integrated Sensing and Communication Intelligent Localization for Integrated Sensing and Communication
٢٠٢٥
Secure Communications in Unmanned Aerial Vehicle-Enabled Mobile Edge Computing Systems Secure Communications in Unmanned Aerial Vehicle-Enabled Mobile Edge Computing Systems
٢٠٢٥