Distributed denial of service attacks : (Record no. 15043)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04279cam a2200553Ki 4500 |
001 - CONTROL NUMBER | |
control field | 9781315213125 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | FlBoTFG |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220724194220.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 200826s2020 flua ob 000 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | OCoLC-P |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | OCoLC-P |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781315213125 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1315213125 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781351817646 |
Qualifying information | (electronic bk. : EPUB) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1351817647 |
Qualifying information | (electronic bk. : EPUB) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781351817653 |
Qualifying information | (electronic bk. : PDF) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1351817655 |
Qualifying information | (electronic bk. : PDF) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9780367491543 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781138626812 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1190776888 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC-P)1190776888 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5105.59 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 012040 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 043000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 053000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UB |
Source | bicssc |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8/7 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Brooks, R. R. |
Fuller form of name | (Richard R.), |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Distributed denial of service attacks : |
Remainder of title | real-world detection and mitigation / |
Statement of responsibility, etc. | Richard R. Brooks, İlker Özçelik. |
250 ## - EDITION STATEMENT | |
Edition statement | First edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Boca Raton, FL : |
Name of producer, publisher, distributor, manufacturer | Chapman and Hall/CRC, |
Date of production, publication, distribution, manufacture, or copyright notice | 2020. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (xxiv, 398 pages) : |
Other physical details | illustration |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Table of ContentsList of FiguresList of TablesForewordAbout the AuthorsAcknowledgementsPrefaceContributorsIntroductionWhat is DDoS?History and MotivationLegal ConsiderationsDDoS Research: TrafficDDoS Research: TestingDDoS Research: EvaluationAttack DetectionDeceiving DDoS DetectionDetecting DDoS Attack TrafficAttack MitigationSecurity and DDoS in SDN: Opportunities and ChallengesDenial of Service Attack in Control SystemsDenial of Service Attack on Phasor Measurement UnitDDoS LabConclusionAppendixBibliographyIndex |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems. This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment, network security, ethics, contemporary social issues, and engineering principles into a laboratory based course of instruction. Unique features of this book include: A history of DDoS attacks that includes attacker motivations Discussion of cyber-war, censorship, and Internet black-outs SDN based DDoS laboratory assignments Up-to-date review of current DDoS attack techniques and tools Review of the current laws that globally relate to DDoS Abuse of DNS, NTP, BGP and other parts of the global Internet infrastructure to attack networks Mathematics of Internet traffic measurement Game theory for DDoS resilience Construction of content distribution systems that absorb DDoS attacks This book assumes familiarity with computing, Internet design, appropriate background in mathematics, and some programming skills. It provides analysis and reference material for networking engineers and researchers. By increasing student knowledge in security, and networking; it adds breadth and depth to advanced computing curricula. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | OCLC-licensed vendor bibliographic record. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Denial of service attacks. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Computer Graphics / Game Programming & Design |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Networking / General |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS / Security / General |
Source of heading or term | bisacsh |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Özçelik, İlker, |
Relator term | author. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Read Online |
Uniform Resource Identifier | <a href="https://www.taylorfrancis.com/books/9781315213125">https://www.taylorfrancis.com/books/9781315213125</a> |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | OCLC metadata license agreement |
Uniform Resource Identifier | <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | eBook |
No items available.