000696147 000__ 02721cam\a2200481Ii\4500 000696147 001__ 696147 000696147 005__ 20230306135640.0 000696147 006__ m\\\\\o\\d\\\\\\\\ 000696147 007__ cr\cnunnnunnun 000696147 008__ 131223s2014\\\\nyua\\\\ob\\\\000\0\eng\d 000696147 020__ $$a9781461494911$$qelectronic book 000696147 020__ $$a1461494915$$qelectronic book 000696147 020__ $$z9781461494904 000696147 0247_ $$a10.1007/978-1-4614-9491-1$$2doi 000696147 035__ $$aSP(OCoLC)ocn866578849 000696147 035__ $$aSP(OCoLC)866578849 000696147 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDXCP$$dCOO$$dOHS$$dN$T$$dGGVRL$$dOHS$$dDEBBG 000696147 049__ $$aISEA 000696147 050_4 $$aTK5105.59 000696147 08204 $$a005.8$$223 000696147 1001_ $$aYu, Shui,$$eauthor. 000696147 24510 $$aDistributed denial of service attack and defense$$h[electronic resource] /$$cShui Yu. 000696147 264_1 $$aNew York, NY :$$bSpringer,$$c2014. 000696147 300__ $$a1 online resource (x, 97 pages) :$$billustrations. 000696147 336__ $$atext$$btxt$$2rdacontent 000696147 337__ $$acomputer$$bc$$2rdamedia 000696147 338__ $$aonline resource$$bcr$$2rdacarrier 000696147 4901_ $$aSpringerBriefs in Computer Science,$$x2191-5768 000696147 504__ $$aIncludes bibliographical references. 000696147 5050_ $$aAn Overview of DDoS Attacks -- Malicious Networks for DDoS Attacks -- DDoS Attack Detection -- Attack Source Traceback -- DDoS Attack and Defence in Cloud -- Future Work. 000696147 506__ $$aAccess limited to authorized users. 000696147 520__ $$aThis brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also supplies an overview of DDoS attack issues, DDoS attack detection methods, DDoS attack source traceback, and details on how hackers organize DDoS attacks. The author concludes with future directions of the field, including the impact of DDoS attacks on cloud computing and cloud technology. The concise yet comprehensive nature of this brief makes it an ideal reference for researchers and professionals studying DDoS attacks. It is also a useful resource for graduate students interested in cyberterrorism and networking. 000696147 588__ $$aDescription based on online resource; title from PDF title page (SpringerLink, viewed November 11, 2013). 000696147 650_0 $$aDenial of service attacks. 000696147 650_0 $$aComputer networks$$xAccess control. 000696147 650_0 $$aComputer networks$$xSecurity measures. 000696147 650_0 $$aComputer security. 000696147 77608 $$iPrint version:$$z9781461494904 000696147 830_0 $$aSpringerBriefs in computer science. 000696147 85280 $$bebk$$hSpringerLink 000696147 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://dx.doi.org/10.1007/978-1-4614-9491-1$$zOnline Access 000696147 909CO $$ooai:library.usi.edu:696147$$pGLOBAL_SET 000696147 980__ $$aEBOOK 000696147 980__ $$aBIB 000696147 982__ $$aEbook 000696147 983__ $$aOnline 000696147 994__ $$a92$$bISE