The document discusses denial of service (DoS) attacks and methods of mitigation. It describes various types of DoS attacks including flooding attacks like TCP SYN floods and UDP floods that exhaust server bandwidth or resources. Other attacks discussed include HTTP floods, SSL handshake floods, and attacks that exploit vulnerabilities or misuse features like HTTP POST floods and SSL renegotiation attacks. State-of-the-art mitigation techniques mentioned include DoS mitigation software developed by the Society for Electronic Transactions & Security that use techniques like client puzzles to protect against various application layer attacks.