1 Describes the latest work on the attribution problem to help identify culprits of cyber-attacks
2 Describes how a variety of subfields of computer science are applied to cyber-security including artificial intelligence, game theory, programming languages, and graph theory
3 Fully referenced
4 Features chapters by leading scientists in the field