EUR 47,38
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condizione: New. Distributed Denial of Service Attacks. Book.
EUR 49,54
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 46,80
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: Chiron Media, Wallingford, Regno Unito
EUR 44,44
Quantità: 10 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
EUR 46,79
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
EUR 53,39
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
EUR 43,30
Quantità: 5 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Distributed Denial of Service Attacks | Analysis of Defenses | Eric Chan-Tin | Taschenbuch | Einband - flex.(Paperback) | Englisch | 2009 | VDM Verlag Dr. Müller | EAN 9783639179521 | Verantwortliche Person für die EU: OmniScriptum GmbH & Co. KG, Bahnhofstr. 28, 66111 Saarbrücken, info[at]akademikerverlag[dot]de | Anbieter: preigu.
Da: PBShop.store US, Wood Dale, IL, U.S.A.
EUR 50,65
Quantità: Più di 20 disponibili
Aggiungi al carrelloPAP. Condizione: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
EUR 48,49
Quantità: Più di 20 disponibili
Aggiungi al carrelloPAP. Condizione: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 49,95
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Distributed Denial of Service (DDoS) attacks areattempts to overwhelm a computer system in order todeny access by legitimate users. They are generallyunstoppable, but there is a good deal of on-goingresearch on methods to reduce their negative effects.This paper will deal with the design of a model thatsimulates such an attack. The simulation model isthen used to study possible ways to defend againstthese attacks. Three experiments are run: 1) using apriority queue to sort messages from clients based onhow many connections they have open on the server; 2)limiting the number of connections each client cancreate; and 3) having the server forcefully deletethe oldest established connection, whenever itsconnection table becomes full. Results show thatmethod 1 is totally ineffective while method 2somewhat improves the overall performance of thesystem. However, method 3, combined with method 2,produces significantly improved performance against aDDoS attack.