Security: Difference between revisions

468 bytes added ,  11 years ago
no edit summary
No edit summary
No edit summary
Line 183:
 
===Select References===
 
APT1: Exposing One of China’s Cyber Espionage Units. 2013. [http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf APT1: Exposing One of China’s Cyber Espionage Units]. (http://www.mandiant.com/apt1). intelreport.mandiant.com.
 
Adams, Cecil. 2013. [http://www.straightdope.com/columns/read/3092/how-can-i-access-the-deep-dark-web How can I access the deep, dark Web?]. February 8. straightdope.com.
Line 271 ⟶ 273:
 
===Select Video and Audio===
 
APT1: Exposing One of China’s Cyber Espionage Units. 2013. [http://www.mandiant.com/apt1 APT1: Exposing One of China’s Cyber Espionage Units]. (http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf). intelreport.mandiant.com.
 
Bambauer, Derek, and Oliver Day. 2011. [http://cyber.law.harvard.edu/events/luncheon/2011/07/hackersaegis The Hacker's Aegis - Protecting Hackers From Lawyers]. Cambridge, MA: The Berkman Center for Internet and Society at Harvard University.
Anonymous user