Inside the enemy's computer : identifying cyber-attackers / Clement Guitton.
Attribution -- tracing those responsible for a cyber attack -- is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attri...
Main Author: | Guitton, Clement (Author) |
---|---|
Language: | English |
Published: |
London :
C Hurst & Co. (Publishers) Ltd.,
2017.
|
Subjects: | |
Physical Description: | x, 304 pages : illustration ; 23 cm |
Format: | Book |