• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • Inside the Enemy's Computer: Identifying Cyber Attackers

    Inside the Enemy's Computer by Guitton, Clement;

    Identifying Cyber Attackers

      • GET 10% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice GBP 30.00
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        14 332 Ft (13 650 Ft + 5% VAT)
      • Discount 10% (cc. 1 433 Ft off)
      • Discounted price 12 899 Ft (12 285 Ft + 5% VAT)

    14 332 Ft

    db

    Availability

    Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
    Not in stock at Prospero.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Product details:

    • Publisher C Hurst & Co Publishers Ltd
    • Date of Publication 26 January 2017

    • ISBN 9781849045544
    • Binding Hardback
    • No. of pages224 pages
    • Size 225x145 mm
    • Language English
    • 0

    Categories

    Short description:

    When your business, your defence ministry or your PC is hacked, how do you know who did it, given the limitless range of possible culprits? This book explores the complexities of attribution

    More

    Long description:

    Attribution - tracing those responsible for a cyber attack - is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on technical evidence. In the national security context, decision-makers must analyse unreliable and mainly non-technical information in order to identify an enemy of the state. Attribution in both contexts is political: in criminal cases, laws reflect society's prevailing norms and power; in national security cases, attribution reflects a state's will to maintain, increase or assert its power. However, both processes differ on many levels. The constraints, which reflect common aspects of many other political issues, constitute the structure of the book: the need for judgement calls, the role of private companies, the standards of evidence, the role of time, and the plausible deniability of attacks.

    Who did it? This is one of the hardest questions of any investigation. It gets even harder in high-profile computer network breaches. Clement Guitton's book is an invaluable guide to attributing cyber attacks. 'Inside the Enemy's Computer' adds much-needed attention to detail, historical depth, and conceptual clarity.

    More
    Recently viewed
    previous
    Inside the Enemy's Computer: Identifying Cyber Attackers

    Sensors and Systems for Space Applications VII

    Pham, Khanh; Cox, Joseph; (ed.)

    38 571 HUF

    35 486 HUF

    20% %discount
    Inside the Enemy's Computer: Identifying Cyber Attackers

    Challenges of Software Verification

    Arceri, Vincenzo; Cortesi, Agostino; Ferrara, Pietro; Olliaro, Martina

    66 563 HUF

    53 250 HUF

    20% %discount
    Inside the Enemy's Computer: Identifying Cyber Attackers

    Algebraic, Complex, and Arithmetic Dynamics

    Jonsson, Mattias; DeMarco, Laura

    124 254 HUF

    99 404 HUF

    20% %discount
    Inside the Enemy's Computer: Identifying Cyber Attackers

    Research Handbook on the EU’s Common Foreign and Security Policy

    Blockmans, Steven; Koutrakos, Panos; (ed.)

    108 449 HUF

    86 759 HUF

    Inside the Enemy's Computer: Identifying Cyber Attackers

    Intelligent Data Analysis in Science

    Cartwright, H.; (ed.)

    29 142 HUF

    26 228 HUF

    next