Télécharger le livre :  Inside the Enemy's Computer
Ajouter à ma liste d'envies
Attribution - tracing those responsible for a cyber attack - is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it...

Editeur : Oxford University Press
Parution : 2017-08-01

PDF, ePub

19,22