References
Amazon Web Services (December, 2019). AWS Best Practices for DDoS Resiliency. Retrieved from Amazon Web Services: https://d1.awsstatic.com/whitepapers/Security/DDoS_White_Paper.pdf
Anderson, N. (May 14, 2007). Massive DDoS attacks target Estonia; Russia accused. Retrieved from Ars Technica: https://arstechnica.com/information-technology/2007/05/massive-ddos-attackstarget-estonia-russia-accused/
Google (n.d.). Google Transparency Report. Google Safe Browsing. Retrieved from https://transparencyreport.google.com/safe-browsing/overview?unsafe=dataset:0;series:malware,phishing;start:1148194800000;end:1587279600000&lu=unsafe
Google (May, 2020). Safe Browsing site status. Retrieved from Google Transparency Report: https://transparencyreport.google.com/safe-browsing/search?hl=en
Google (August, 2022). Safe Browsing. Retrieved from Google Transparency Report: https://transparencyreport.google.com/safe-browsing/search?hl=en
Google (May 9, 2020). Where malware originates. Retrieved...