Identifying Attackers from Network Evidence

Global Events / Cybersecurity Books