This is an interim version of our Electronic Legal Deposit Catalogue-eJournals and eBooks while we continue to recover from a cyber-attack.
Attribution of advanced persistent threats : how to identify the actors behind cyber-espionage /: how to identify the actors behind cyber-espionage. ([2020])
Record Type:
Book
Title:
Attribution of advanced persistent threats : how to identify the actors behind cyber-espionage /: how to identify the actors behind cyber-espionage. ([2020])
Main Title:
Attribution of advanced persistent threats : how to identify the actors behind cyber-espionage
Advanced Persistent Threats.- The attribution process.-Analysis of malware.- Attack infrastructure.- Analysis of control servers.- Geopolitical analysis.- Telemetry - data from security products.- Methods of intelligence agencies.- Doxing.- False flags.- Group set-ups.- Communication.- Ethics of attribution.
Note: Includes bibliographical references and index. Note: Description based on online resource; title from digital title page (viewed on August 18, 2020).
Access Rights:
Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
Access Usage:
Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.