Inside the Enemy's Computer
Autor Clement Guittonen Limba Engleză Hardback – sep 2017
attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on
technical evidence. In the national security context, decision-makers must analyse unreliable and mainly non-technical information in order to identify an enemy of the state. Attribution in both contexts is political: in criminal cases, laws reflect society's prevailing norms and powers; in national
security cases, attribution reflects a state's will to maintain, increase or assert its power. However, both processes differ on many levels. The constraints, which reflect common aspects of many other political issues, constitute the structure of the book: the need for judgement calls, the role of
private companies, the standards of evidence, the role of time, and the plausible deniability of attacks.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Hardback (2) | 163.95 lei 3-5 săpt. | |
C Hurst & Co Publishers Ltd – mar 2017 | 163.95 lei 3-5 săpt. | |
Early English Text Society – sep 2017 | 278.84 lei 3-5 săpt. |
Preț: 278.84 lei
Nou
Puncte Express: 418
Preț estimativ în valută:
53.36€ • 55.59$ • 44.37£
53.36€ • 55.59$ • 44.37£
Carte disponibilă
Livrare economică 18 ianuarie-01 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780190699994
ISBN-10: 019069999X
Pagini: 320
Dimensiuni: 149 x 226 x 27 mm
Greutate: 0.49 kg
Editura: Early English Text Society
ISBN-10: 019069999X
Pagini: 320
Dimensiuni: 149 x 226 x 27 mm
Greutate: 0.49 kg
Editura: Early English Text Society
Notă biografică
Clement Guitton is a former analyst with the Department of Defence, Switzerland; he is now an assistant manager for cyber security at PwC.
Descriere
Descriere de la o altă ediție sau format:
When your business, your defence ministry or your PC is hacked, how do you know who did it, given the limitless range of possible culprits? This book explores the complexities of attribution
When your business, your defence ministry or your PC is hacked, how do you know who did it, given the limitless range of possible culprits? This book explores the complexities of attribution