0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Inside the Enemy's Computer - Identifying Cyber Attackers (Hardcover) Loot Price: R819
Discovery Miles 8 190
You Save: R65 (7%)
Inside the Enemy's Computer - Identifying Cyber Attackers (Hardcover): Clement Guitton

Inside the Enemy's Computer - Identifying Cyber Attackers (Hardcover)

Clement Guitton

 (sign in to rate)
List price R884 Loot Price R819 Discovery Miles 8 190 | Repayment Terms: R77 pm x 12* You Save R65 (7%)

Bookmark and Share

Expected to ship within 12 - 17 working days

Attribution - tracing those responsible for a cyber attack - is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on technical evidence. In the national security context, decision-makers must analyse unreliable and mainly non-technical information in order to identify an enemy of the state. Attribution in both contexts is political: in criminal cases, laws reflect society's prevailing norms and power; in national security cases, attribution reflects a state's will to maintain, increase or assert its power. However, both processes differ on many levels. The constraints, which reflect common aspects of many other political issues, constitute the structure of the book: the need for judgement calls, the role of private companies, the standards of evidence, the role of time, and the plausible deniability of attacks.

General

Imprint: C Hurst & Co Publishers Ltd
Country of origin: United Kingdom
Release date: 2017
Authors: Clement Guitton
Dimensions: 225 x 145 x 26mm (L x W x T)
Format: Hardcover
Pages: 224
ISBN-13: 978-1-84904-554-4
Categories: Books > Computing & IT > Computer communications & networking > Network security
LSN: 1-84904-554-2
Barcode: 9781849045544

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

CISA - Certified Information Systems…
Cannon Paperback R1,620 R1,221 Discovery Miles 12 210
Managing Enterprise Content - A Unified…
Ann Rockley, Charles Cooper Paperback R1,594 Discovery Miles 15 940
Introduction to Computer Security…
Michael Goodrich, Roberto Tamassia Paperback R2,255 Discovery Miles 22 550
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,276 Discovery Miles 12 760
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R619 Discovery Miles 6 190
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,525 Discovery Miles 65 250
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,190 Discovery Miles 81 900
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,256 Discovery Miles 62 560
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R6,949 R6,257 Discovery Miles 62 570
System of Controls - I.T.'s Guide to…
William D Reed Hardcover R1,029 R854 Discovery Miles 8 540
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R6,256 Discovery Miles 62 560
Research Anthology on Business Aspects…
Information Resources Management Association Hardcover R12,087 Discovery Miles 120 870

See more

Partners