Inside the enemy's computer : identifying cyber-attackers / Clement Guitton.

Attribution -- tracing those responsible for a cyber attack -- is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attri...

Full description

Bibliographic Details
Main Author: Guitton, Clement (Author)
Language:English
Published: London : C Hurst & Co. (Publishers) Ltd., 2017.
Subjects:
Physical Description:x, 304 pages : illustration ; 23 cm
Format: Book

System Under Maintenance

Our Library Management System is currently under maintenance.

Holdings and item availability information is currently unavailable. Please accept our apologies for any inconvenience this may cause and contact us for further assistance:

Please contact Reference and Discovery Services via their Contact Form or call them directly at: 517-353-8700 for assistance.