Search Results - "Hezbollah"

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Hezbollah born with a vengeance by Jaber

    Published 1997
    Book
  2. 2

    Hezbollah a short history by Norton

    Published 2007
    Book
  3. 3
  4. 4
  5. 5

    The 33-day war Israel's war on Hezbollah in Lebanon and its consequences by Achcar, Gilbert, Warschawski, Michel

    Published 2007
    Table of Contents: “…Lebanon, from its origins to July 12, 2006 -- Hezbollah, from its origins to July 12, 2006 -- The thirty-three-day war and its consequences in Lebanon -- Israel, between its "second Lebanon War" and its participation in Washington's "Global war" -- Conclusion : the sinking ship of U.S. imperial designs…”
    Book
  6. 6

    From militants to politicians Atavist Islam and the concept of democratic peace by Wyllie, James H.

    Published 2008
    Book
  7. 7

    My life is a weapon a modern history of suicide bombing by Reuter, Christoph

    Published 2004
    Table of Contents: “…The marketing strategies of martyrdom : Hezbollah in Lebanon -- 4. Israel and Palestine : the culture of death -- 5. …”
    Book
  8. 8

    My life is a weapon a modern history of suicide bombing by Reuter, Christoph

    Published 2004
    Table of Contents: “…The marketing strategies of martyrdom : Hezbollah in Lebanon -- 4. Israel and Palestine : the culture of death -- 5. …”
    Book
  9. 9

    Media, religion and conflict

    Published 2009
    Table of Contents: “…: the corporation and the coverage of the 2006 Israeli-Hezbollah war / Ivor Gaber and Lisa Thomas -- Islam as a threat? …”
    Book
  10. 10

    Israel vs. Iran the shadow war by Katz, Yaakov 1979-

    Book
  11. 11
  12. 12

    Krisis Syria pentanda dunia di ambang kiamat by Shafie Abdul Rahman 1960-

    Published 2014
    Book
  13. 13

    Eclipse of the Sunnis power, exile, and upheaval in the Middle East by Amos, Deborah

    Published 2010
    Book
  14. 14

    Hizbullah's DNA and the Arab Spring by Alagha, Joseph Elie

    Published 2013
    Book
  15. 15

    The Sunni tragedy in the Middle East Northern Lebanon from al-Qaeda to ISIS by Rougier, Bernard

    Published 2015
    Book
  16. 16

    Introduction to cyber-warfare a multidisciplinary approach by Shakarian, Paulo, Shakarian, Jana, Ruef, Andrew

    Published 2013
    Table of Contents: “…-- Attribution, Deception, and Intelligence -- Information Assurance -- I.Cyber Attack -- 2.Political Cyber Attack Comes of Age in 2007 -- Reliance on Information as a Vulnerability -- Rudimentary but Effective: Denial of Service -- Leaving Unwanted Messages: Web Site Defacement -- Tools for Denial of Service -- The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack -- Estonia Is Hit by Cyber Attacks -- General Response to DDoS -- Summary -- Suggested Further Reading -- 3.How Cyber Attacks Augmented Russian Military Operations -- The 2008 Russian Cyber Campaign Against Georgia -- What Is Interesting About the Russian Cyber Campaign -- Preparing for a Cyber-Capable Adversary -- Summary -- Suggested Further Reading -- 4.When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East -- Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah "July War" of 2006 -- Civilians in the Cyber Melee: Operation Cast Lead -- Summary -- Suggested Further Reading -- 5.Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia -- DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks -- Silencing Novaya Gazeta and Other Russian Dissidents -- Iran -- How the 2009 Elections Led to Aggressive Cyber Operations -- Summary -- 6.Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates -- "Chaotic" Beginnings: The Chaos Computer Club; CCC -- The Roots of the Anon -- 4chan, 7chan, and Other Message Boards -- How We Are Influenced by 4chan: Memes -- Anonymous -- On Image, Structure, and Motivation -- Anonymous -- External Connections and Spin Offs -- Your Security Is a Joke: LulzSec -- Anonymous' Modus Operandi -- Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous -- Software for the Legion: Anonymous Products -- Summary -- Suggested Further Reading -- II.Cyber Espionage And Exploitation -- 7.Enter the Dragon: Why Cyber Espionage Against Militaries, Dissidents, and Nondefense Corporations Is a Key Component of Chinese Cyber Strategy -- Introduction -- Why Cyber Espionage Is Important to China: A Look at Chinese Cyber Doctrine -- Leveraging Resources Beyond the Military: The Cyber Warriors of China -- Stealing Information from the U.S. …”
    Book
  17. 17

    The war on Lebanon a reader

    Published 2008
    Book