1 Describes the latest work on the attribution problem to help identify culprits of cyber-attacks 2 Describes how a variety of subfields of computer science are applied to cyber-security including artificial intelligence, game theory, programming languages, and graph theory 3 Fully referenced4 Features chapters by leading scientists in the field
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.