Search Results - Aurora, Ohio~
Suggested Topics within your search.
Suggested Topics within your search.
-
1
Wide Courses
Published 2004“…The wrecker -- Laying the hose-pipe ghost -- The seizure of the "Aurora Borealis" -- Light-ship 67 -- Captain Blaise -- Don Quixote Kieran, pump-man -- Jan Tingloff -- Cogan capeador.…”
Get full text
Rights
Electronic eBook -
2
The God of His Fathers: Tales of the Klondyke
Published 1999“…The god of his fathers -- The great interrogation -- Which make men remember -- Siwash -- The man with the gash -- Jan, the unrepentant -- Grit of women -- Where the trail forks -- A daughter of the aurora -- At the rainbow's end -- The scorn of…”
Get full text
Rights
Electronic eBook -
3
A history of cyber security attacks 1980 to present
Published 2017Table of Contents: “…The 1980s -- Kevin Mitnick -- The 414s -- Legion of doom -- Chaos computer club -- Fry guy -- Fred Cohen -- Morris worm (internet worm) -- The 1990s -- Nahshon even-chaim -- Masters of deception -- Operation sun devil -- Griffiss AFB and the Korean Atomic Research Institute -- Ehud Tenenbaum -- The Brotherhood of Warez -- The 2000s -- Mafiaboy -- Operation Shady Rat - 2006 -- Night dragon - 2006 -- Zeus - 2007 -- Operation aurora - 2009 -- Stuxnet - 2010 -- Operation potao express - 2011 -- Saudi Aramco - 2012 -- Target data breach - 2013 -- Neiman Marcus - 2013 -- Michaels attack - 2013 -- P.F. …”
Book -
4
Introduction to cyber-warfare a multidisciplinary approach
Published 2013Table of Contents: “…-- Attribution, Deception, and Intelligence -- Information Assurance -- I.Cyber Attack -- 2.Political Cyber Attack Comes of Age in 2007 -- Reliance on Information as a Vulnerability -- Rudimentary but Effective: Denial of Service -- Leaving Unwanted Messages: Web Site Defacement -- Tools for Denial of Service -- The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack -- Estonia Is Hit by Cyber Attacks -- General Response to DDoS -- Summary -- Suggested Further Reading -- 3.How Cyber Attacks Augmented Russian Military Operations -- The 2008 Russian Cyber Campaign Against Georgia -- What Is Interesting About the Russian Cyber Campaign -- Preparing for a Cyber-Capable Adversary -- Summary -- Suggested Further Reading -- 4.When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East -- Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah "July War" of 2006 -- Civilians in the Cyber Melee: Operation Cast Lead -- Summary -- Suggested Further Reading -- 5.Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia -- DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks -- Silencing Novaya Gazeta and Other Russian Dissidents -- Iran -- How the 2009 Elections Led to Aggressive Cyber Operations -- Summary -- 6.Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates -- "Chaotic" Beginnings: The Chaos Computer Club; CCC -- The Roots of the Anon -- 4chan, 7chan, and Other Message Boards -- How We Are Influenced by 4chan: Memes -- Anonymous -- On Image, Structure, and Motivation -- Anonymous -- External Connections and Spin Offs -- Your Security Is a Joke: LulzSec -- Anonymous' Modus Operandi -- Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous -- Software for the Legion: Anonymous Products -- Summary -- Suggested Further Reading -- II.Cyber Espionage And Exploitation -- 7.Enter the Dragon: Why Cyber Espionage Against Militaries, Dissidents, and Nondefense Corporations Is a Key Component of Chinese Cyber Strategy -- Introduction -- Why Cyber Espionage Is Important to China: A Look at Chinese Cyber Doctrine -- Leveraging Resources Beyond the Military: The Cyber Warriors of China -- Stealing Information from the U.S. …”
Book


