Narrow your search
Listing 1 - 2 of 2
Sort by

Book
Inside the enemy's computer : identifying cyber attackers
Author:
ISBN: 0190848502 9780190848507 Year: 2017 Publisher: New York, NY : Oxford University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Attribution is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. This work examines this important topic.


Book
Defense against the black arts : how hackers do what they do and how to protect against it
Authors: ---
ISBN: 042910376X 1283350076 9786613350077 1439821224 1439821194 1138453617 Year: 2017 Publisher: Boca Raton, FL : Auerbach Publications,

Loading...
Export citation

Choose an application

Bookmark

Abstract

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Amon

Listing 1 - 2 of 2
Sort by