Security: Difference between revisions
Content added Content deleted
No edit summary |
No edit summary |
||
Line 183: | Line 183: | ||
===Select References=== |
===Select References=== |
||
APT1: Exposing One of China’s Cyber Espionage Units. 2013. [http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf APT1: Exposing One of China’s Cyber Espionage Units]. (http://www.mandiant.com/apt1). intelreport.mandiant.com. |
|||
Adams, Cecil. 2013. [http://www.straightdope.com/columns/read/3092/how-can-i-access-the-deep-dark-web How can I access the deep, dark Web?]. February 8. straightdope.com. |
Adams, Cecil. 2013. [http://www.straightdope.com/columns/read/3092/how-can-i-access-the-deep-dark-web How can I access the deep, dark Web?]. February 8. straightdope.com. |
||
Line 271: | Line 273: | ||
===Select Video and Audio=== |
===Select Video and Audio=== |
||
APT1: Exposing One of China’s Cyber Espionage Units. 2013. [http://www.mandiant.com/apt1 APT1: Exposing One of China’s Cyber Espionage Units]. (http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf). intelreport.mandiant.com. |
|||
Bambauer, Derek, and Oliver Day. 2011. [http://cyber.law.harvard.edu/events/luncheon/2011/07/hackersaegis The Hacker's Aegis - Protecting Hackers From Lawyers]. Cambridge, MA: The Berkman Center for Internet and Society at Harvard University. |
Bambauer, Derek, and Oliver Day. 2011. [http://cyber.law.harvard.edu/events/luncheon/2011/07/hackersaegis The Hacker's Aegis - Protecting Hackers From Lawyers]. Cambridge, MA: The Berkman Center for Internet and Society at Harvard University. |