Search Results - Julie Blaha~
Suggested Topics within your search.
Suggested Topics within your search.
- History 2
- Security sector 2
- Accidents 1
- Aerial operations, Canadian 1
- Air pilots 1
- Arab Spring, 2010- 1
- Colonial administrators 1
- Colonial influence 1
- Colonies 1
- Computer crimes 1
- Crimes against 1
- Cyberspace 1
- Cyberterrorism 1
- Data protection 1
- Demonstrations 1
- Description and travel 1
- Drilling platforms 1
- Electrooptical devices 1
- Immigrants 1
- Information display systems 1
- Information warfare 1
- Islam and politics 1
- Massacres 1
- Mathematics 1
- Officials and employees 1
- Offshore oil industry 1
- Offshore oil well drilling 1
- Palestinian Arabs 1
- Police brutality 1
- Politics and government 1
-
1
-
2
Mathematical relationships in education identities and participation /
Published 2009NetLibrary
MyiLibrary
Click here to view book
MyiLibrary
Electronic eBook -
3
-
4
May-Day and Other Pieces
Published 2005“…May-day -- The Adirondacs -- Occasional and miscellaneous pieces: Brahma. Nemesis. Fate. Freedom. Ode sung in the Town hall, Concord, July 4, 1857. …”
Get full text
Rights
Electronic eBook -
5
The Candelaria Massacre how Wagner dos Santos survived the street children's killing that shook Brazil
Published 2008Table of Contents: “…23 July 1993 -- Part I : it happened -- The new democracy -- Wagner dos Santos -- Real life -- Come-gato/ruço -- Taking over Candeĺaria -- Birthday party -- Part II : investigations -- Identification parades -- Hospitals and funerals -- Whispers and rumours -- Vigário geral -- Refuge in Bahia -- The rio comprido link -- 'O corpo fechado' - 'A closed body' -- Part II : testimony -- Secret investigations -- Second time around -- Running and hiding -- Back on the case -- The move to Geneva -- Nelson Cunha -- New suspects -- Sonia -- The trial -- Part IV : exile -- Understanding the past -- No return -- Doubts and certainties -- March 2007 -- 22 July 1993 -- This Rio de Janeiro.…”
Book -
6
The long way home an American journey from Ellis Island to the Great War
Table of Contents: “…Old countries -- Journeys -- Streets of gold -- The weak, the broken, and the mentally crippled -- The world at war -- The army of forty-three languages -- I go where you send me -- July 4, 1918 -- These fought in any case -- The Jews and the Wops and the dirty Irish cops -- The arc of fire -- Breaking the line -- Blanc Mont -- Why should I shoot them? …”
Book -
7
Zambia, then and now colonial rulers and their African successors /
Published 2009Table of Contents: “…Zambia now : impressions of a retired district officer, returning 45 years later. Diary of a Bwana who came back, from June 24th to July 25th, 2006 -- Images -- Zambia's economy -- From then to now : what has changed.…”
MyiLibrary
for University of Minnesota Twin Cities access
NetLibrary
MyiLibrary
Electronic eBook -
8
Electro-optical displays
Published 1992Table of Contents: “…Luo, Zvi Yaniv -- Flat-Panel Displays / Alan Sobel -- Color Image Display with Black-and-White Film / Guo-Guang Mu ... [et al.] -- Pt.II. …”
Book -
9
Military atlas of tank warfare
Published 2014Table of Contents: “…The Battle Fronts: 1914-17 -- The Somme: 1916 -- The Nivelle Offensive -- Cambrai: 1917 -- Tank Attack: c.1917 -- Tank Tactical Formation: 1917 -- Villers Bretonneux 1918 -- The German Spring Offensives: March-July 1918 -- Soissons: 1918 -- Black Day of the German Army:1918 -- American Offensives: September-November 1918 -- Plan 1919 -- Infantry Versus Tank c.1930 -- Russia's New Tank Industries: 1930-39 -- Spanish Civil War: 1936-39 -- Nomonhan: 20-31 August 1939 -- Blitzkrieg Poland: 1939 -- Invasion of the West: 1939-40 -- The Fall of France: 1940 -- World Tank Forces: 1941-42 -- North Africa: 1941-42 -- Barbarossa: 22 June-1 October 1941 -- Operation Typhoon-Wotan: 1941 -- Moscow: 1942 -- Aircraft Versus Tank -- Caucasus-South Russia: 1942 -- Stalingrad: 1942-43 -- North Africa: 1942-43 -- Velikiye Luki Operation: 1942-43 -- Sicily and Italy: 1943 -- Kursk: 1943 -- Ukraine and the Crimea: 1944 -- D-Day, The Assault: 1944 -- Market Garden: 1944 -- China: 1937-45 -- Bagration: 1944 -- Budapest and Vienna -- Bulge: 1944 -- The Pacific: 1944-45 -- The Fall of the Reich: 1945 -- Manchuria: 1945 -- Korea: 1950-53 -- Arab-Israeli Wars: 1948-82 -- Indo-China and Vietnam -- NATO Versus Warsaw Pact -- The First Gulf War: 1990-91 -- The Second Gulf and Afghanistan Wars -- The Future Armoured Force…”
Book -
10
-
11
Introduction to cyber-warfare a multidisciplinary approach
Published 2013Table of Contents: “…-- Attribution, Deception, and Intelligence -- Information Assurance -- I.Cyber Attack -- 2.Political Cyber Attack Comes of Age in 2007 -- Reliance on Information as a Vulnerability -- Rudimentary but Effective: Denial of Service -- Leaving Unwanted Messages: Web Site Defacement -- Tools for Denial of Service -- The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack -- Estonia Is Hit by Cyber Attacks -- General Response to DDoS -- Summary -- Suggested Further Reading -- 3.How Cyber Attacks Augmented Russian Military Operations -- The 2008 Russian Cyber Campaign Against Georgia -- What Is Interesting About the Russian Cyber Campaign -- Preparing for a Cyber-Capable Adversary -- Summary -- Suggested Further Reading -- 4.When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East -- Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah "July War" of 2006 -- Civilians in the Cyber Melee: Operation Cast Lead -- Summary -- Suggested Further Reading -- 5.Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia -- DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks -- Silencing Novaya Gazeta and Other Russian Dissidents -- Iran -- How the 2009 Elections Led to Aggressive Cyber Operations -- Summary -- 6.Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates -- "Chaotic" Beginnings: The Chaos Computer Club; CCC -- The Roots of the Anon -- 4chan, 7chan, and Other Message Boards -- How We Are Influenced by 4chan: Memes -- Anonymous -- On Image, Structure, and Motivation -- Anonymous -- External Connections and Spin Offs -- Your Security Is a Joke: LulzSec -- Anonymous' Modus Operandi -- Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous -- Software for the Legion: Anonymous Products -- Summary -- Suggested Further Reading -- II.Cyber Espionage And Exploitation -- 7.Enter the Dragon: Why Cyber Espionage Against Militaries, Dissidents, and Nondefense Corporations Is a Key Component of Chinese Cyber Strategy -- Introduction -- Why Cyber Espionage Is Important to China: A Look at Chinese Cyber Doctrine -- Leveraging Resources Beyond the Military: The Cyber Warriors of China -- Stealing Information from the U.S. …”
Book -
12
-
13


