Research Anthology on Combating Denial-of-Service Attacks

Research Anthology on Combating Denial-of-Service Attacks

Release Date: August, 2020|Copyright: © 2021 |Pages: 655
DOI: 10.4018/978-1-7998-5348-0
ISBN13: 9781799853480|ISBN10: 1799853489|EISBN13: 9781799853497
Hardcover:
Available
$365.00
TOTAL SAVINGS: $365.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Available
$328.50
List Price: $365.00
10% Discount:-$36.50
TOTAL SAVINGS: $36.50
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Available
$440.00
TOTAL SAVINGS: $440.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to these networks’ shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives but also by an inherent logistical bias that grants advantage to attackers.

Research Anthology on Combating Denial-of-Service Attacks examines the latest research on the development of intrusion detection systems and best practices for preventing and combatting cyber-attacks intended to disrupt business and user experience. Highlighting a range of topics such as network administration, application-layer protocols, and malware detection, this publication is an ideal reference source for cybersecurity professionals, IT specialists, policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Application-Layer Protocols
  • Botnet Identification
  • Cyber Attacks
  • Database Security
  • Distributed Denial-of-Service Attack (DDoS)
  • Hacking
  • Intrusion Detection System
  • Malware Detection
  • Network Administration
  • VPN Security
  • Web Security
Table of Contents
Search this Book:
Reset
Editor Biographies
Information Resources Management Association (IRMA) is a research-based professional organization dedicated to advancing the concepts and practices of information resources management in modern organizations. IRMA's primary purpose is to promote the understanding, development and practice of managing information resources as key enterprise assets among IRM/IT professionals. IRMA brings together researchers, practitioners, academicians, and policy makers in information technology management from over 50 countries.
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). Learn More >
Ethics & Malpractice
IGI Global book and journal editors and authors are provided written guidelines and checklists that must be followed to maintain the high value that IGI Global places on the work it publishes. As a full member of the Committee on Publication Ethics (COPE), all editors, authors and reviewers must adhere to specific ethical and quality standards, which includes IGI Global’s full ethics and malpractice guidelines and editorial policies. These apply to all books, journals, chapters, and articles submitted and accepted for publication. To review our full policies, conflict of interest statement, and post-publication corrections, view IGI Global’s Full Ethics and Malpractice Statement.