Linux Server Security: Hack and Defend, Chris Binnie
Автор: Stuttard Название: The Web Application Hacker`s Handbook: Discovering and Exploiting Security Flaws ISBN: 0470170778 ISBN-13(EAN): 9780470170779 Издательство: Wiley Рейтинг: Цена: 35890.00 T Наличие на складе: Невозможна поставка. Описание: A guide to discovering and exploiting security flaws in web applications. It explains each category of vulnerability using real-world examples, screen shots and code extracts. It describes the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking and e-commerce.
Автор: Wright Joshua, Cache Johnny Название: Hacking Exposed Wireless, Third Edition: Wireless Security Secrets & Solutions ISBN: 0071827633 ISBN-13(EAN): 9780071827638 Издательство: McGraw-Hill Рейтинг: Цена: 75490.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Featuring the proven Hacking Exposed method, this new edition of this bestseller reveals how to defend against the latest wireless network attacks by getting inside the mind of the hacker.
Автор: I.S. Amiri Название: Theoretical and Experimental Methods for Defending Against DDOS A ISBN: 0128053917 ISBN-13(EAN): 9780128053911 Издательство: Elsevier Science Рейтинг: Цена: 53890.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание:
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim s IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks. A comprehensive study on the basics of network securityProvides a wide revision on client puzzle theoryAn experimental model to mitigate distributed denial of service (DDoS) attacks"
Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2) ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz