Inside the Enemy's Computer
Identifying Cyber Attackers
- Publisher's listprice GBP 30.00
-
14 332 Ft (13 650 Ft + 5% VAT)
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 10% (cc. 1 433 Ft off)
- Discounted price 12 899 Ft (12 285 Ft + 5% VAT)
Subcribe now and take benefit of a favourable price.
Subscribe
14 332 Ft
Availability
Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
Not in stock at Prospero.
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Publisher C Hurst & Co Publishers Ltd
- Date of Publication 26 January 2017
- ISBN 9781849045544
- Binding Hardback
- No. of pages224 pages
- Size 225x145 mm
- Language English 0
Categories
Short description:
When your business, your defence ministry or your PC is hacked, how do you know who did it, given the limitless range of possible culprits? This book explores the complexities of attribution
MoreLong description:
Attribution - tracing those responsible for a cyber attack - is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on technical evidence. In the national security context, decision-makers must analyse unreliable and mainly non-technical information in order to identify an enemy of the state. Attribution in both contexts is political: in criminal cases, laws reflect society's prevailing norms and power; in national security cases, attribution reflects a state's will to maintain, increase or assert its power. However, both processes differ on many levels. The constraints, which reflect common aspects of many other political issues, constitute the structure of the book: the need for judgement calls, the role of private companies, the standards of evidence, the role of time, and the plausible deniability of attacks.
Who did it? This is one of the hardest questions of any investigation. It gets even harder in high-profile computer network breaches. Clement Guitton's book is an invaluable guide to attributing cyber attacks. 'Inside the Enemy's Computer' adds much-needed attention to detail, historical depth, and conceptual clarity.
Sensors and Systems for Space Applications VII
38 571 HUF
35 486 HUF