Amazon Price: N/A (as of June 24, 2017 07:47 –
Distributed Denial of Service (DDoS) attack is one of the most disruptive attacks in computer networks. It utilizes legitimate requests from hundreds or thousands of computers to specific targets to occupy targets' bandwidth and deplete targets' resource. In this work, we have attempted to not only mitigate DDoS attacks but also identify the source of attacks even behind Network Address Translation (NAT). This is followed by remedial actions such as denying further access or informing them that they have participated in the attacks.
This report presents a new algorithm to prevent servers from DDoS attacks. This algorithm requires that network routers or gateways collaborate with each other in order to detect suspicious traffic. The algorithm initiates a peer-to-peer communication among network routers or gateways to increase the probability of detecting unwanted traffic. We derive mathematical proofs based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. This implementation is to prevent the attacker from sending spam traffic to the server which can lead to DDoS attacks. The effectiveness of our implementation is evidenced in our experimental results.
Amazon Price: N/A (as of February 2, 2016 00:20 –
Chinese Cyber Crime is the first comprehensive book describing the hacking underworld within the People's Republic of China. Based upon direct field research and experience with Chinese hackers this book goes where no other has gone before. China's latest national security law and draft cyber security sovereignty law are introduced and reviewed in applicability to China's efforts to control nefarious Chinese cybercrime. Industry advice and guidance aptly provided by Tommy Stiansen, CTO, Norse Corporation.
Amazon Price: N/A (as of June 24, 2017 12:36 –
Computer hacking is an extremely powerful skill to have. This book focuses on ethical hacking – also known as white hat hacking.
Continue reading “Computer Hacking: A beginners guide to computer hacking, how to hack, internet skills, hacking techniques, and more!”
Amazon Price: N/A (as of June 24, 2017 14:11 –
Introduction to the Command Line is a visual guide that teaches the most important Unix and Linux shell commands in a simple and straight forward manner. Command line programs covered in this book are demonstrated with typical usage to aid in the learning process and help you master the command line quickly and easily. Covers popular Unix, Linux, and BSD systems.
Amazon Price: N/A (as of June 24, 2017 03:28 –
A NATIONAL BESTSELLER
A programmer, musician, and father of virtual reality technology, Jaron Lanier was a pioneer in digital media, and among the first to predict the revolutionary changes it would bring to our commerce and culture. Now, with the Web influencing virtually every aspect of our lives, he offers this provocative critique of how digital design is shaping society, for better and for worse.
Continue reading “You Are Not a Gadget”