Search Results
- Articles
- Books & Media
- Our Website
- Collection Guides
- Archival Materials
ArticlesSee all articles results »
From journals and magazines
-
Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in (...)
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1bb9MwFLY29gIP3CUKo_IDgpd5aS7OBW1DoW3UDrGNFajgxXIcm1UqbUXSH8W_5Jw42VpxeUKV2lSx7ETn-POxdc73EfLCjXLlydywQJmIBTJwWaK8mPlBGMgQPlxjofA0Pv3ifbiMs_4OGbW1MHW2O2JjjdJytSqdYqmcNOIQaASJ13PS87Phmw31jPUx5j-Llcaz5XKX7HHuRzhFx-l5i8k-t8qEyDfGQlhRLdsm7C1iZ3w6mY4nh14S1aU7G6tTg9G7s2-z35C6Xn6ye6S8fnDMvT60uSf2FGIrKbtld_wf73if3G2iVZpa93pAdvTiIbmzwWH4iPwcIPUuqmbpgh5dnQwwe29-5FydMPi3NKxBI5pWFdbz4x0qFwUdaANbaE3fayw-npXfSzpb0M-wd1-uSzrVORvWdV0FtcoTMBq9mMsKo-zyNbWygQe036rBwDV2m9UkKbTNKKQNpsPkekw-ZcOP_RFr9B-Y8hO_YjrsSeXmYeLzXp4UBldW6SmAxThP_BCcSXNuctfTGoK6BJn3IhV6ieFa-ZHi_hNCXeMqzlUotSmCQJucGyNlVEAUl0e5DDvkoDW4UA0rOopzzAXsjtA_hPUPYf2jQ15eN19ZOpC_NXyFFhYIE9Cfkk21w3KhkXBL3Bi7Q_a3WsL0Vlu3j8H_RIMspWgMKqw1xdKIxox_fAw3hu5bz73pxIM4G1mTevHTf4_-jNz2sN6jPnPaJ7eqH2v93OpmdMne2-HZxSX8jvrj7Gu3nnHw_S5iXUyhnfwCqCI3rQ
International Journal On Semantic Web And Information Systems, Volume 18, Issue 1, pp. 1 - 43
Journal Article : Full Text Online
-
Cybercrime Deterrence and International Legislation
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV1LSwMxEA7qQfTgoypWq-zBm2y7eWySPUq1qChYH4inkMwmIpQibT347002u6U9qOw1CWEmmUf2m28QOsPCANHGpQycSJlmOC2AyJQyzjT3X25DofCrvH0jw0c56NcgmmkNq6xwgdVffB8gmZHteSdCCkHYKlqVOI-89HNzi0XVVtenV9yHipLGyhiS0yzr3d88DX16j0WP-VywG3pILnifCEBcNsKk9iyDbfTQ7KmCVXcjrCQ-MCzhrRvixn-3v4O26igzuYjHYhet2HELrTcg9xbaXKAh3EO0_23sBALRf3IZ4DFVBWCix2Wy9GCY3Nn3j2kEz-2jl8HVc_86rZsppEAFmaU8MxlwAdTlIEHIQPVHMyuKwIfD_bV2JORCDKAEy0rqdOAiM7IA4wNwTekhSrDDkOfAtXUlY9aZ3DmtRelDIiOM5m2EG-kqqCnGQ6eLkfKpRqURFTSigkYUw4qoTLbR-XzOZyTY-HP0QSXe-dBGtm3UabSo6ls4Vd66hO6YuGBHv807Rhth_Qj-6qC12eTLnsTGEKfVOfsBFufOmA
Mis Quarterly, Volume 41, Issue 2, pp. 497 - 524
Journal Article : Full Text Online
-
A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed (...)
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3ta9NAGD-2ieAX2VQ0OsuJA18ga5NccgmMQdqudIIzzoovX8Ld5W4tdOnYOv3ov-7zXC5llekHKaS55tK8PO_J8_weQvYCLlUopPGZMtxnggV-psLUj1jCRAKfWGOh8Jf03bfw42k6GmyQuK2FsUn7Ss726_n5fj2b2tzKi3PVbfPEusX7AWNRlGSsu0k2IYBZD9FBgBnPECCmUccRRASx7TAXJxAnsZ4r0gM7CoF_AAt8E4YN4cCzB3cF--PesFAWyN9W6woYi5XivjvFkPnn7DbH9M_8ygZ9yhqs0Ta57zxNmjdXtEM2dP2A7DhZvqKvHeD0m4fkV05PFj_0nBYNaAMoQDpqk7YoeLV0qA36lvUZHU8mhd8H01fRg-nhEFP15nRhqNM5B93pIRV1RYcIyIu9tP4ykebLJZb34w6PyOfR0WQw9l1jBl9BfNMDaia84lKAdy4kh6BEoJuSKLjtsRJhqFklpDACQYFZViUQlYkssvFeZiJmoieEBiZQcawSoU3FmDYyNkYIXoF7JeGvE4-8balQKgdXjl0z5qUNW-K4ROqVDfU8sreafNGgdNw-rY_kXE1BaG37w-LyrHQMVla9TFZVJNJMCjDWWgoFYbPW4OkGMuxJjzx2zHDjUDwFx9Ejr5A5SlQNcKpKuAqHRa0RZKvMWYLYOgnPPPLS8c-_T3e35a3SaZarMkDAuAjsTOqRF6vNoBPwRY-o9eLazkGcPyAHnGzDiqvjtFzuEb7GpGs3ZX0LiKHFHXdi9_S_93xG7uHlNU-wdsnW8vJaP2-6cHRAlL_yDrmTTwbFJ_juH50Upx37iARG48Hx6DuMjvMPsCxiXAeh_w18d03o
The Scientific World, Volume 2015, Issue 2015, pp. 1 - 19
Journal Article : Full Text Online
Books & MediaSee all books & media results »
Books, music, movies and more
-
Internet denial of service : attack and defense mechanisms
https://find.library.duke.edu/catalog/DUKE99119283032408501
Book : View Online
-
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
https://find.library.duke.edu/catalog/DUKE99119545958908501
Book : View Online
-
Attacking network protocols : a hacker's guide to capture, analysis, and exploitation
https://find.library.duke.edu/catalog/DUKE99119245410308501
Book : View Online
Our WebsiteSee all website results »
Guides, policies, news more
-
Scholarly Communications @ Duke - Page 5 of 58 - Discussions about the changing world of scholarly c
https://blogs.library.duke.edu/scholcomm/page/5/
-
Scholarly Communications @ Duke - Page 23 of 58 - Discussions about the changing world of scholarly
https://blogs.library.duke.edu/scholcomm/page/23/
The judge in the Zediva case concluded that the service “clearly transmits plaintiffs copyrighted works” because the service (...)
-
The Devil's Tale - Page 3 of 131 - Dispatches from the David M. Rubenstein Rare Book and Manuscript
https://blogs.library.duke.edu/rubenstein/page/3/
“The Sexual Liberals and the Attack on Feminism: A Full Day Conference” poster (1987), Dorothy “Cookie” Teer Papers, Rubenstein Library.
Collection GuidesSee all collection guides results »
Detailed inventories of archival collections
-
W. H. Amerine papers, 1956,1960 and undated
https://archives.lib.duke.edu/catalog/amerinewh
Collection comprises five brief essays Amerine wrote to attack advances in Civil Rights made during the 1950s, noting that members of the white (...)
Some materials and descriptions may include offensive content. More info