Internet Denial of Service: Attack and Defense Mechanisms
By Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher
Publisher: Prentice Hall PTR | ||
Pub Date: December 30, 2004 | ||
Print ISBN: 0-13-147573-8 | ||
Pages: 400 |
Overview
Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide.
It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Inside, you'll find comprehensive information on the following topics How denial-of-service attacks are waged How to improve your network's resilience to denial-of-service attacks What to do when you are involved in a denial-of-service attack The laws that apply to these attacks and their implications How often denial-of-service attacks occur, how strong they are, and the kinds of damage they can cause Real examples of denial-of-service attacks as experienced by the attacker, victim, and unwitting accomplices The authors' extensive experience in handling denial-of-service attacks and researching defense approaches is laid out clearly in practical, detailed terms.
Download ebook on :
Easy Share
Ziddu
Label: networking, system, web
Related Books
system
- Mechanical Engineering Systems
- PLC Beginner Guide
- Digital Systems Design with FPGAs and CPLDs
- Hacker Dictionary
- .NET Domain-Driven Design with C#
- Embedded Linux Primer: A Practical, Real-World Approach
- Internet Denial of Service: Attack and Defense Mechanisms
- WiMAX/MobileFi - Advanced Research and Technology
- Windows 2000 Server Resource Kit TCP/IP Core Networking Guide
- Windows 2000 Server System Administration Handbook
- Hacking Exposed ™ Web 2.0 Reviews
- Deploying Voice over Wireless LANs
- TCP Performance over UMTS-HSDPA Systems
- Computer Security and Cryptography
- Backup and Recovery
- Integrated Security Systems Design: Concepts, Specifications, and Implementation
web
- Incomplete Guide to Building a Web site that Works
- 501 Web Site Secrets®: Unleash the Power of Google®, Amazon®, eBay®, and More
- Website Creation Course
- Building a Web Site For Dummies®, 2nd Edition
- .NET Domain-Driven Design with C#
- Foundation Website Creation with CSS, XHTML, and JavaScript
- Internet Denial of Service: Attack and Defense Mechanisms
- IEEE - Internet Computing
- PHP & MySQL® For Dummies® 3rd Edition
- Learning PHP and MySQL-A Step by Step Guide to Creating Dynamic Database Driven Websites
- A Designer's Guide to Adobe InDesign and XML
- Rails for PHP Developers
- Beginning PHP and MySQL: From Novice to Professional, Third Edition
- PHP 6 and MySQL 5 for Dynamic Web Sites
- PHP & MySQL® For Dummies® 3rd Edition
- Visual Basic® .NET Unleashed
- Professional IIS 7 and ASP.NET Integrated Programming
- Professional ADO.NET 2 Programming with SQL Server 2005, Oracle®, and MySQL®
- Google Web Toolkit Solutions
- Beginning Web Development, Silverlight, and ASP.NET AJAX
- SEO Search Engine Optimization Bible
- Google Web Toolkit Applications
- ASP.NET 2.0 Illustrated
- Hacking Exposed ™ Web 2.0 Reviews
- Professional Joomla!
networking
- Nmap in the Enterprise
- Hacker Dictionary
- Internet Denial of Service: Attack and Defense Mechanisms
- WiMAX/MobileFi - Advanced Research and Technology
- Windows 2000 Server Resource Kit TCP/IP Core Networking Guide
- Windows 2000 Server System Administration Handbook
- Networking with Microsoft® Windows Vista
- Windows Vista®: Home Networking
- Interconnecting Cisco Network Devices
- Deploying Voice over Wireless LANs
- TCP Performance over UMTS-HSDPA Systems
- Computer Security and Cryptography
- Networking For Dummies
- How to Cheat at Securing a Wireless Network