These are the sources and citations used to research Penetration Test 19th April 2018. This bibliography was generated on Cite This For Me on

  • Website

    DDoS Attack Prevention and Mitigation Techniques - A Review

    2018

    In-text: (DDoS Attack Prevention and Mitigation Techniques - A Review, 2018)

    Your Bibliography: Citeseerx.ist.psu.edu. 2018. DDoS Attack Prevention and Mitigation Techniques - A Review. [online] Available at: <http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.403.5319&rep=rep1&type=pdf> [Accessed 9 May 2018].

  • Website

    Digital Attack Map

    2018

    In-text: (Digital Attack Map, 2018)

    Your Bibliography: Digitalattackmap.com. 2018. Digital Attack Map. [online] Available at: <https://www.digitalattackmap.com/understanding-ddos/> [Accessed 9 May 2018].

  • Website

    Mitigation of SQL Injection Attack using Prepared Statements (Parameterized Queries) - GeeksforGeeks

    In-text: (Mitigation of SQL Injection Attack using Prepared Statements (Parameterized Queries) - GeeksforGeeks, n.d.)

    Your Bibliography: GeeksforGeeks. n.d. Mitigation of SQL Injection Attack using Prepared Statements (Parameterized Queries) - GeeksforGeeks. [online] Available at: <https://www.geeksforgeeks.org/mitigation-sql-injection-attack-using-prepared-statements-parameterized-queries/> [Accessed 7 May 2018].

  • Website

    [Withdrawn] Mitigating Denial of Service (DoS) Attacks

    2018

    In-text: ([Withdrawn] Mitigating Denial of Service (DoS) Attacks, 2018)

    Your Bibliography: GOV.UK. 2018. [Withdrawn] Mitigating Denial of Service (DoS) Attacks. [online] Available at: <https://www.gov.uk/guidance/mitigating-denial-of-service-dos-attacks> [Accessed 10 May 2018].

  • Website

    IBM Knowledge Center

    2018

    In-text: (IBM Knowledge Center, 2018)

    Your Bibliography: Ibm.com. 2018. IBM Knowledge Center. [online] Available at: <https://www.ibm.com/support/knowledgecenter/en/ssw_aix_72/com.ibm.aix.security/nfs_guidelines.htm> [Accessed 10 May 2018].

  • Website

    DDOS MITIGATION

    2018

    In-text: (DDOS MITIGATION, 2018)

    Your Bibliography: Incapsula.com. 2018. DDOS MITIGATION. [online] Available at: <https://www.incapsula.com/ddos/ddos-mitigation-services.html> [Accessed 9 May 2018].

  • Website

    Understanding Teardrop Attacks - Technical Documentation - Support - Juniper Networks

    2018

    In-text: (Understanding Teardrop Attacks - Technical Documentation - Support - Juniper Networks, 2018)

    Your Bibliography: Juniper.net. 2018. Understanding Teardrop Attacks - Technical Documentation - Support - Juniper Networks. [online] Available at: <https://www.juniper.net/documentation/en_US/junos/topics/concept/denial-of-service-os-teardrop-attack-understanding.html> [Accessed 9 May 2018].

  • Website

    DoS Guidance - Upstream defences - NCSC Site

    2018

    In-text: (DoS Guidance - Upstream defences - NCSC Site, 2018)

    Your Bibliography: Ncsc.gov.uk. 2018. DoS Guidance - Upstream defences - NCSC Site. [online] Available at: <https://www.ncsc.gov.uk/guidance/dos-upstream-defences> [Accessed 10 May 2018].

  • Website

    Preparing for denial of service (DoS) attacks - NCSC Site

    2018

    In-text: (Preparing for denial of service (DoS) attacks - NCSC Site, 2018)

    Your Bibliography: Ncsc.gov.uk. 2018. Preparing for denial of service (DoS) attacks - NCSC Site. [online] Available at: <https://www.ncsc.gov.uk/guidance/preparing-denial-service-dos-attacks> [Accessed 10 May 2018].

  • Website

    Understanding denial of service (DoS) attacks - NCSC Site

    2018

    In-text: (Understanding denial of service (DoS) attacks - NCSC Site, 2018)

    Your Bibliography: Ncsc.gov.uk. 2018. Understanding denial of service (DoS) attacks - NCSC Site. [online] Available at: <https://www.ncsc.gov.uk/guidance/understanding-denial-service-dos-attacks> [Accessed 9 May 2018].

  • Website

    Using nfsshell to compromise older environments | Pen Test Partners

    2018

    In-text: (Using nfsshell to compromise older environments | Pen Test Partners, 2018)

    Your Bibliography: Pentestpartners.com. 2018. Using nfsshell to compromise older environments | Pen Test Partners. [online] Available at: <https://www.pentestpartners.com/security-blog/using-nfsshell-to-compromise-older-environments/> [Accessed 10 May 2018].

  • Website

    NFS Security in Both Trusted and Untrusted Environments

    2018

    In-text: (NFS Security in Both Trusted and Untrusted Environments, 2018)

    Your Bibliography: Sans.org. 2018. NFS Security in Both Trusted and Untrusted Environments. [online] Available at: <https://www.sans.org/reading-room/whitepapers/linux/nfs-security-trusted-untrusted-environments-1956> [Accessed 10 May 2018].

  • Website

    Teardrop Attack

    2018

    In-text: (Teardrop Attack, 2018)

    Your Bibliography: Security.radware.com. 2018. Teardrop Attack. [online] Available at: <https://security.radware.com/ddos-knowledge-center/ddospedia/teardrop-attack/> [Accessed 9 May 2018].

  • Website

    Vulnerability Database and Intelligence: Skybox Vulnerability Center

    2018

    In-text: (Vulnerability Database and Intelligence: Skybox Vulnerability Center, 2018)

    Your Bibliography: Vulnerabilitycenter.com. 2018. Vulnerability Database and Intelligence: Skybox Vulnerability Center. [online] Available at: <https://www.vulnerabilitycenter.com/#!vul=1747> [Accessed 10 May 2018].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join