0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Inside the Enemy's Computer - Identifying Cyber Attackers (Hardcover) Loot Price: R843
Discovery Miles 8 430
Inside the Enemy's Computer - Identifying Cyber Attackers (Hardcover): Clement Guitton

Inside the Enemy's Computer - Identifying Cyber Attackers (Hardcover)

Clement Guitton

 (sign in to rate)
Loot Price R843 Discovery Miles 8 430 | Repayment Terms: R79 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

Attribution - tracing those responsible for a cyber attack - is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on technical evidence. In the national security context, decision-makers must analyse unreliable and mainly non-technical information in order to identify an enemy of the state. Attribution in both contexts is political: in criminal cases, laws reflect society's prevailing norms and power; in national security cases, attribution reflects a state's will to maintain, increase or assert its power. However, both processes differ on many levels. The constraints, which reflect common aspects of many other political issues, constitute the structure of the book: the need for judgement calls, the role of private companies, the standards of evidence, the role of time, and the plausible deniability of attacks.

General

Imprint: C Hurst & Co Publishers Ltd
Country of origin: United Kingdom
Release date: 2017
Authors: Clement Guitton
Dimensions: 225 x 145 x 26mm (L x W x T)
Format: Hardcover
Pages: 224
ISBN-13: 978-1-84904-554-4
Categories: Books > Computing & IT > Computer communications & networking > Network security
Promotions
LSN: 1-84904-554-2
Barcode: 9781849045544

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,200 Discovery Miles 62 000
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310
Managing Resources for Futuristic…
Tariq Umer Hardcover R5,327 Discovery Miles 53 270
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R5,931 Discovery Miles 59 310

See more

Partners