| 000 | 01053nam a22002897i 4500 | ||
|---|---|---|---|
| 999 |
_c176456 _d176456 |
||
| 003 | OSt | ||
| 005 | 20200218123931.0 | ||
| 008 | 200218s2017 enk g 001 0 eng d | ||
| 020 |
_a9781849045544 _cRM180.00 _qhardback |
||
| 040 |
_aPPAK _beng _cPPAK _erda |
||
| 082 | 0 | 4 |
_223 _a363.325 |
| 090 | 0 | 0 |
_a363.325 _bGUI _dR |
| 100 | 1 |
_aGuitton, Clement., _eauthor. |
|
| 245 | 1 | 0 |
_aInside the Enemy's Computer : _bIdentifying Cyber Attackers / _cCLEMENT GUITTON |
| 264 | 1 |
_aLondon : _bC. Hurst & Co. (Publishers) Ltd., _c2017 |
|
| 300 |
_ax, 304 pages : _c22 cm |
||
| 336 |
_2rdacontent _atext |
||
| 337 |
_2rdamedia _aunmediated |
||
| 338 |
_2rdacarrier _avolume |
||
| 500 | _aIncludes index | ||
| 504 | _aBibliography pages : 255-289 | ||
| 520 | _aWhen your business, your defence ministry or your PC is hacked, how do you know who did it, given the limitless range of possible culprits? This book explores the complexities of attribution | ||
| 650 | 1 | 0 |
_aCyberterrorism _vPrevention |
| 650 | 2 | 0 | _aCyberattacke |
| 650 | 2 | 0 | _aHackers |
| 942 |
_2ddc _cB |
||