This book is designed for readers who have an interest in the cyber security domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals focusing on defensive schemes and applications for detecting or mitigating DDoS attacks.
We publiceren alleen reviews die voldoen aan de voorwaarden voor reviews. Bekijk onze voorwaarden voor reviews.