|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1078253547 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
181206s2018 caua ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d TOH
|d OCLCF
|d G3B
|d STF
|d MERER
|d OCLCQ
|d CZL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|z 9781492026174
|
029 |
1 |
|
|a AU@
|b 000069002925
|
035 |
|
|
|a (OCoLC)1078253547
|
037 |
|
|
|a CL0501000012
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.875.I57
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Chou, Eric,
|e author.
|
245 |
1 |
0 |
|a Distributed Denial of Service (DDoS) :
|b practical detection and defense /
|c Eric Chou and Rich Groves.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media,
|c [2018]
|
264 |
|
4 |
|c ©2018
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed December 6, 2018).
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a Distributed Denial of Service (DDoS) attacks have existed for almost as long as the commercial web itself, and they remain one of the most effective ways to disrupt online services. But, since many of these attacks go undisclosed, industry collaboration on ways to combat them has been slow to emerge. This ebook provides engineers and IT managers with techniques for detecting and mitigating ongoing and potential DDoS events. Authors Rich Groves and Eric Chou explain how DDoS can disrupt services by flooding your network with traffic from many different sources, often by using a botnet. You'll learn about the people behind these attacks and their motivations--such as criminals seeking financial gain, thrill and status seekers, and angry and disgruntled users--and ways that you can thwart them. The techniques in this ebook enable small to mid-sized organizations to implement DDoS prevention measures on a budget--before the size of your infrastructure requires the services of a commercial DDoS vendor. Get an overview of DDoS, including common attacks, botnet-driven attacks, and those that take advantage of IoT devices Explore the pros and cons of current DDoS detection methods and mechanisms Study the approach to DDoS mitigation at the network and application level, including ways to combat SYN Flood and Classic Flood attacks Evaluate cloud-based DDoS detection and mitigation vendors to determine the best fit for your organization Learn how to leverage community-based systems to construct a DDoS-focused Threat Intelligence system.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Denial of service attacks.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Attaques par saturation.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Denial of service attacks
|2 fast
|
650 |
|
7 |
|a Internet
|x Security measures
|2 fast
|
700 |
1 |
|
|a Groves, Rich,
|e author.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781492026181/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|