Hacking - Computers (certified, ethical): Difference between revisions
Content added Content deleted
No edit summary |
No edit summary |
||
Line 277: | Line 277: | ||
http://news.slashdot.org/story/13/01/20/1823256/edward-tuftes-defense-of-aaron-swartz-and-the-marvelously-different |
http://news.slashdot.org/story/13/01/20/1823256/edward-tuftes-defense-of-aaron-swartz-and-the-marvelously-different |
||
'''China''' |
|||
APT1: Exposing One of China’s Cyber Espionage Units. 2013. [http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf APT1: Exposing One of China’s Cyber Espionage Units]. (http://www.mandiant.com/apt1). intelreport.mandiant.com. |
|||
SANGER, DAVID E., DAVID BARBOZA and NICOLE PERLROTH. 2013. [http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html Chinese Army Unit Is Seen as Tied to Hacking Against U.S.]. February 18. New York, NY: The New York Times. |
|||