Search Results - "Hezbollah"
Suggested Topics within your search.
Suggested Topics within your search.
- Islam and politics 6
- Politics and government 5
- Islam 3
- Arab-Israeli conflict 2
- Geopolitics 2
- Lebanon War, 2006 2
- Martyrdom 2
- Relations 2
- Religious aspects 2
- Shiites 2
- Suicide bombers 2
- Sunnites 2
- Violence 2
- Arab Spring, 2010- 1
- Civil war, 2011 1
- Computer crimes 1
- Cyberspace 1
- Cyberterrorism 1
- Data protection 1
- Democracy 1
- Democratization 1
- End of the World (Islam) 1
- Espionage, Israeli 1
- Failed states 1
- History 1
- Hizballah (lebanon) 1
- Information warfare 1
- Insurgency 1
- Internal security 1
- Iraq War, 2003-2011 1
-
1
-
2
-
3
Hezbollah a short history /
Published 2009NetLibrary
MyiLibrary
Click here to view book
MyiLibrary
Electronic eBook -
4
-
5
The 33-day war Israel's war on Hezbollah in Lebanon and its consequences
Published 2007Table of Contents: “…Lebanon, from its origins to July 12, 2006 -- Hezbollah, from its origins to July 12, 2006 -- The thirty-three-day war and its consequences in Lebanon -- Israel, between its "second Lebanon War" and its participation in Washington's "Global war" -- Conclusion : the sinking ship of U.S. imperial designs…”
Book -
6
-
7
My life is a weapon a modern history of suicide bombing
Published 2004Table of Contents: “…The marketing strategies of martyrdom : Hezbollah in Lebanon -- 4. Israel and Palestine : the culture of death -- 5. …”
Book -
8
My life is a weapon a modern history of suicide bombing
Published 2004Table of Contents: “…The marketing strategies of martyrdom : Hezbollah in Lebanon -- 4. Israel and Palestine : the culture of death -- 5. …”
Book -
9
Media, religion and conflict
Published 2009Table of Contents: “…: the corporation and the coverage of the 2006 Israeli-Hezbollah war / Ivor Gaber and Lisa Thomas -- Islam as a threat? …”
Book -
10
-
11
-
12
-
13
-
14
-
15
-
16
Introduction to cyber-warfare a multidisciplinary approach
Published 2013Table of Contents: “…-- Attribution, Deception, and Intelligence -- Information Assurance -- I.Cyber Attack -- 2.Political Cyber Attack Comes of Age in 2007 -- Reliance on Information as a Vulnerability -- Rudimentary but Effective: Denial of Service -- Leaving Unwanted Messages: Web Site Defacement -- Tools for Denial of Service -- The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack -- Estonia Is Hit by Cyber Attacks -- General Response to DDoS -- Summary -- Suggested Further Reading -- 3.How Cyber Attacks Augmented Russian Military Operations -- The 2008 Russian Cyber Campaign Against Georgia -- What Is Interesting About the Russian Cyber Campaign -- Preparing for a Cyber-Capable Adversary -- Summary -- Suggested Further Reading -- 4.When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East -- Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah "July War" of 2006 -- Civilians in the Cyber Melee: Operation Cast Lead -- Summary -- Suggested Further Reading -- 5.Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia -- DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks -- Silencing Novaya Gazeta and Other Russian Dissidents -- Iran -- How the 2009 Elections Led to Aggressive Cyber Operations -- Summary -- 6.Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates -- "Chaotic" Beginnings: The Chaos Computer Club; CCC -- The Roots of the Anon -- 4chan, 7chan, and Other Message Boards -- How We Are Influenced by 4chan: Memes -- Anonymous -- On Image, Structure, and Motivation -- Anonymous -- External Connections and Spin Offs -- Your Security Is a Joke: LulzSec -- Anonymous' Modus Operandi -- Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous -- Software for the Legion: Anonymous Products -- Summary -- Suggested Further Reading -- II.Cyber Espionage And Exploitation -- 7.Enter the Dragon: Why Cyber Espionage Against Militaries, Dissidents, and Nondefense Corporations Is a Key Component of Chinese Cyber Strategy -- Introduction -- Why Cyber Espionage Is Important to China: A Look at Chinese Cyber Doctrine -- Leveraging Resources Beyond the Military: The Cyber Warriors of China -- Stealing Information from the U.S. …”
Book -
17


