Distributed denial of service attacks : (Record no. 71078)

000 -LEADER
fixed length control field 04259cam a2200541Ki 4500
001 - CONTROL NUMBER
control field 9781315213125
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220531132338.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200826s2020 flua ob 000 0 eng d
040 ## - Cataloging Source
-- OCoLC-P
-- eng
-- rda
-- pn
-- OCoLC-P
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781315213125
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1315213125
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781351817646
-- (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1351817647
-- (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781351817653
-- (electronic bk. : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1351817655
-- (electronic bk. : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780367491543
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781138626812
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1190776888
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC-P)1190776888
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
072 #7 -
-- COM
-- 012040
-- bisacsh
072 #7 -
-- COM
-- 043000
-- bisacsh
072 #7 -
-- COM
-- 053000
-- bisacsh
072 #7 -
-- UB
-- bicssc
082 04 -
-- 005.8/7
-- 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Brooks, R. R.
Fuller form of name (Richard R.),
Relator term author.
245 10 - TITLE STATEMENT
Title Distributed denial of service attacks :
Remainder of title real-world detection and mitigation /
Statement of responsibility, etc. Richard R. Brooks, İlker Özçelik.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 -
-- Boca Raton, FL :
-- Chapman and Hall/CRC,
-- 2020.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xxiv, 398 pages) :
Other physical details illustration
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
505 0# -
-- Table of ContentsList of FiguresList of TablesForewordAbout the AuthorsAcknowledgementsPrefaceContributorsIntroductionWhat is DDoS?History and MotivationLegal ConsiderationsDDoS Research: TrafficDDoS Research: TestingDDoS Research: EvaluationAttack DetectionDeceiving DDoS DetectionDetecting DDoS Attack TrafficAttack MitigationSecurity and DDoS in SDN: Opportunities and ChallengesDenial of Service Attack in Control SystemsDenial of Service Attack on Phasor Measurement UnitDDoS LabConclusionAppendixBibliographyIndex
520 ## -
-- Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems. This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment, network security, ethics, contemporary social issues, and engineering principles into a laboratory based course of instruction. Unique features of this book include: A history of DDoS attacks that includes attacker motivations Discussion of cyber-war, censorship, and Internet black-outs SDN based DDoS laboratory assignments Up-to-date review of current DDoS attack techniques and tools Review of the current laws that globally relate to DDoS Abuse of DNS, NTP, BGP and other parts of the global Internet infrastructure to attack networks Mathematics of Internet traffic measurement Game theory for DDoS resilience Construction of content distribution systems that absorb DDoS attacks This book assumes familiarity with computing, Internet design, appropriate background in mathematics, and some programming skills. It provides analysis and reference material for networking engineers and researchers. By increasing student knowledge in security, and networking; it adds breadth and depth to advanced computing curricula.
588 ## -
-- OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Denial of service attacks.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Computer Graphics / Game Programming & Design
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Networking / General
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Security / General
Source of heading or term bisacsh
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Özçelik, İlker,
Relator term author.
856 40 -
-- Taylor & Francis
-- https://www.taylorfrancis.com/books/9781315213125
856 42 -
-- OCLC metadata license agreement
-- http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf

No items available.

Technical University of Mombasa
Tom Mboya Street, Tudor 90420-80100 , Mombasa Kenya
Tel: (254)41-2492222/3 Fax: 2490571