Image from Google Jackets

Inside the Enemy's Computer : Identifying Cyber Attackers / CLEMENT GUITTON

By: Publisher: London : C. Hurst & Co. (Publishers) Ltd., 2017Description: x, 304 pages : 22 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781849045544
Subject(s): DDC classification:
  • 23 363.325
Summary: When your business, your defence ministry or your PC is hacked, how do you know who did it, given the limitless range of possible culprits? This book explores the complexities of attribution
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Cover image Item type Current library Home library Collection Shelving location Call number Materials specified Vol info URL Copy number Status Notes Date due Barcode Item holds Item hold queue priority Course reserves
Book Perpustakaan Alor Setar RFID Rujukan Dewasa R 363.325 GUI (Browse shelf(Opens below)) Not For Loan A01635130

Includes index

Bibliography pages : 255-289

When your business, your defence ministry or your PC is hacked, how do you know who did it, given the limitless range of possible culprits? This book explores the complexities of attribution

There are no comments on this title.

to post a comment.