|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
OR_on1224591702 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
080513s2004 xx eo 000 0 eng d |
040 |
|
|
|a TOH
|b eng
|c TOH
|d OCLCF
|d OCLCQ
|
020 |
|
|
|a 9780131475731
|
020 |
|
|
|a 0131475738
|
024 |
8 |
|
|a 0131475738
|
035 |
|
|
|a (OCoLC)1224591702
|
082 |
0 |
4 |
|a 005.8
|q OCoLC
|2 22/eng/20230216
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Mirkovic, Jelena,
|e author.
|
245 |
1 |
0 |
|a Internet Denial of Service:
|b Attack and Defense Mechanisms /
|c Mirkovic, Jelena.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Pearson,
|c 2004.
|
300 |
|
|
|a 1 online resource (400 pages).
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
365 |
|
|
|b 44.99
|
490 |
1 |
|
|a The Radia Perlman series in computer networking and security
|
520 |
|
|
|a Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Inside, you'll find comprehensive information on the following topics How denial-of-service attacks are waged How to improve your network's resilience to denial-of-service attacks What to do when you are involved in a denial-of-service attack The laws that apply to these attacks and their implications How often denial-of-service attacks occur, how strong they are, and the kinds of damage they can cause Real examples of denial-of-service attacks as experienced by the attacker, victim, and unwitting accomplices The authors' extensive experience in handling denial-of-service attacks and researching defense approaches is laid out clearly in practical, detailed terms.
|
542 |
|
|
|f © Pearson Technology Group
|g 2005
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
0 |
|
|a Online resource; Title from title page (viewed December 30, 2004).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer crimes
|x Prevention.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
7 |
|a Computer crimes
|x Prevention.
|2 fast
|0 (OCoLC)fst00872068
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Internet
|x Security measures.
|2 fast
|0 (OCoLC)fst01751426
|
700 |
1 |
|
|a Dietrich, Sven,
|e author.
|
700 |
1 |
|
|a Mirkovic, Jelena.
|
700 |
1 |
|
|a Dittrich, David,
|e author.
|
700 |
1 |
|
|a Reiher, Peter,
|e author.
|
710 |
2 |
|
|a O'Reilly for Higher Education (Firm),
|e distributor.
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
776 |
0 |
8 |
|i Print version:
|z 0131475738
|w (DLC) 2004020335
|w (OCoLC)56405001
|
830 |
|
0 |
|a Radia Perlman series in computer networking and security.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0131475738/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|