000 01053nam a22002897i 4500
999 _c176456
_d176456
003 OSt
005 20200218123931.0
008 200218s2017 enk g 001 0 eng d
020 _a9781849045544
_cRM180.00
_qhardback
040 _aPPAK
_beng
_cPPAK
_erda
082 0 4 _223
_a363.325
090 0 0 _a363.325
_bGUI
_dR
100 1 _aGuitton, Clement.,
_eauthor.
245 1 0 _aInside the Enemy's Computer :
_bIdentifying Cyber Attackers /
_cCLEMENT GUITTON
264 1 _aLondon :
_bC. Hurst & Co. (Publishers) Ltd.,
_c2017
300 _ax, 304 pages :
_c22 cm
336 _2rdacontent
_atext
337 _2rdamedia
_aunmediated
338 _2rdacarrier
_avolume
500 _aIncludes index
504 _aBibliography pages : 255-289
520 _aWhen your business, your defence ministry or your PC is hacked, how do you know who did it, given the limitless range of possible culprits? This book explores the complexities of attribution
650 1 0 _aCyberterrorism
_vPrevention
650 2 0 _aCyberattacke
650 2 0 _aHackers
942 _2ddc
_cB