Cantitate/Preț
Produs

Inside the Enemy's Computer

Autor Clement Guitton
en Limba Engleză Hardback – sep 2017
Attribution - tracing those responsible for a cyber attack - is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching
attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on
technical evidence. In the national security context, decision-makers must analyse unreliable and mainly non-technical information in order to identify an enemy of the state. Attribution in both contexts is political: in criminal cases, laws reflect society's prevailing norms and powers; in national
security cases, attribution reflects a state's will to maintain, increase or assert its power. However, both processes differ on many levels. The constraints, which reflect common aspects of many other political issues, constitute the structure of the book: the need for judgement calls, the role of
private companies, the standards of evidence, the role of time, and the plausible deniability of attacks.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Hardback (2) 16395 lei  3-5 săpt.
  C Hurst & Co Publishers Ltd – mar 2017 16395 lei  3-5 săpt.
  Early English Text Society – sep 2017 27884 lei  3-5 săpt.

Preț: 27884 lei

Nou

Puncte Express: 418

Preț estimativ în valută:
5336 5559$ 4437£

Carte disponibilă

Livrare economică 18 ianuarie-01 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780190699994
ISBN-10: 019069999X
Pagini: 320
Dimensiuni: 149 x 226 x 27 mm
Greutate: 0.49 kg
Editura: Early English Text Society

Notă biografică


Clement Guitton is a former analyst with the Department of Defence, Switzerland; he is now an assistant manager for cyber security at PwC.

Descriere

Descriere de la o altă ediție sau format:
When your business, your defence ministry or your PC is hacked, how do you know who did it, given the limitless range of possible culprits? This book explores the complexities of attribution