|
Computer Viruses
Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box. Connexions LibraryDocuments Reveal Canada's Secret Hacking Tactics Gallagher, Ryan Article 2015 Canada's electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries' infrastructure, according to newly revealed classified do... Preparing for a Digital 9/11 Greenberg, Karen Article 2012 In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First... Stuxnet on the Loose: Security for the One Percent Blunden, Bill Article 2012 Suspicions that the Stuxnet computer worm was indeed developed by the United States and Israel has once again exposed American exceptionalism. Espionage and sabotage are presented as intolerable crimi... Sources LibraryUS was 'key player in cyber-attacks on Iran's nuclear programme' Obama reported to have approved bid to target Tehran's nuclear efforts Beaumont, Peter; Hopkins, Peter 2012 Fresh light is shed on the rapid development of US cyberwarfare capability and reveal its willingness to use cyber weapons offensively to achieve policies. Watch your attachments: Microsoft Office bug lets hackers take over computers 2014 A dangerous new security vulnerability has been discovered in Microsoft's Office software, threatening to hijack users of virtually every existing version of Windows. The bug in question affects progr... |