Inside the Enemy's Computer : Identifying Cyber Attackers /
CLEMENT GUITTON
- x, 304 pages : 22 cm
Includes index
Bibliography pages : 255-289
When your business, your defence ministry or your PC is hacked, how do you know who did it, given the limitless range of possible culprits? This book explores the complexities of attribution