Coverart for item
The Resource A History of Cyber Security Attacks : 1980 to Present, (electronic book)

A History of Cyber Security Attacks : 1980 to Present, (electronic book)

Label
A History of Cyber Security Attacks : 1980 to Present
Title
A History of Cyber Security Attacks
Title remainder
1980 to Present
Creator
Subject
Language
eng
Member of
Cataloging source
MiAaPQ
http://library.link/vocab/creatorName
Middleton, Bruce
Dewey number
363.325
LC call number
HV6773.15.C97.M533 2017
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/subjectName
Cyberterrorism - History
Label
A History of Cyber Security Attacks : 1980 to Present, (electronic book)
Instantiates
Publication
Copyright
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- About the Author -- Additional Thanks to{u2026} -- Other Books Written by This Author -- Section I : The 1980s -- Chapter 1: Kevin Mitnick -- Bibliography -- Chapter 2: The 414s -- Bibliography -- Chapter 3: Legion of Doom -- Bibliography -- Chapter 4: Chaos Computer Club -- Bibliography -- Chapter 5: Fry Guy -- Bibliography -- Chapter 6: Fred Cohen -- Bibliography -- Chapter 7: Morris Worm (Internet Worm) -- Bibliography -- Section II : The 1990s -- Chapter 8: Nahshon Even-Chaim -- Bibliography -- Chapter 9: Masters of Deception -- Bibliography -- Chapter 10: Operation Sun Devil -- Bibliography -- Chapter 11: Griffiss AFB and the Korean Atomic Research Institute -- Bibliography -- Chapter 12: Ehud Tenenbaum -- Bibliography -- Chapter 13: The Brotherhood of Warez -- Bibliography -- Section III : The 2000s -- Chapter 14: Mafiaboy -- Bibliography -- Chapter 15: Operation Shady RAT-2006 -- Bibliography -- Chapter 16: Night Dragon-2006 -- Bibliography -- Chapter 17: Zeus-2007 -- Infection Method -- Bibliography -- Chapter 18: Operation Aurora-2009 -- Bibliography -- Chapter 19: Stuxnet-2010 -- Bibliography -- Chapter 20: Operation Potao Express-2011 -- Bibliography -- Chapter 21: Saudi Aramco-2012 -- Bibliography -- Chapter 22: Target Data Breach-2013 -- Bibliography -- Chapter 23: Neiman Marcus-2013 -- Bibliography -- Chapter 24: Michaels Attack-2013 -- Bibliography -- Chapter 25: P.F. Chang-2013 -- Bibliography -- Chapter 26: Havex-2014 -- Bibliography -- Chapter 27: Shellshock-2014 -- Bibliography -- Chapter 28: Heartbleed-2014 -- Bibliography -- Chapter 29: Unicorn Bug-2014 -- Bibliography -- Chapter 30: Home Depot-2014 -- Bibliography -- Chapter 31: Sally Beauty Breach-2014 -- Bibliography -- Chapter 32: Goodwill-2014 -- Bibliography -- Chapter 33: Supervalu-2014
  • Bibliography -- Chapter 34: UPS-2014 -- Bibliography -- Chapter 35: Jimmy John's-2014 -- Bibliography -- Chapter 36: Dairy Queen-2014 -- Bibliography -- Chapter 37: Staples-2014 -- Bibliography -- Chapter 38: Kmart-2014 -- Bibliography -- Chapter 39: Sony Pictures-2014 -- Bibliography -- Chapter 40: JPMorgan Chase-2014 -- Bibliography -- Chapter 41: Anthem Healthcare Attack-2015 -- Bibliography -- Chapter 42: Ashley Madison Data Breach-2015 -- Bibliography -- Chapter 43: BlackEnergy-2015 -- SSHBear Door -- Bibliography -- Chapter 44: Sandworm-2015 -- Bibliography -- Chapter 45: HSBC Online Cyber-Attack-2016 -- Bibliography -- Chapter 46: Panama Papers-2016 -- Bibliography -- Appendix -- 1980s -- 1988 -- 1990s -- 2000 -- 2006 -- 2007 -- 2009 -- 2010 -- 2011 -- 2012 -- 2013 -- 2014 -- 2015 -- 2016 -- Index
Control code
EBC4929783
Dimensions
unknown
Edition
1st ed.
Extent
1 online resource (254 pages)
Form of item
online
Isbn
9781351651905
Isbn Type
(ebk)
Media category
computer
Media MARC source
rdamedia
Media type code
c
Note
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Sound
unknown sound
Specific material designation
remote
Label
A History of Cyber Security Attacks : 1980 to Present, (electronic book)
Publication
Copyright
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- About the Author -- Additional Thanks to{u2026} -- Other Books Written by This Author -- Section I : The 1980s -- Chapter 1: Kevin Mitnick -- Bibliography -- Chapter 2: The 414s -- Bibliography -- Chapter 3: Legion of Doom -- Bibliography -- Chapter 4: Chaos Computer Club -- Bibliography -- Chapter 5: Fry Guy -- Bibliography -- Chapter 6: Fred Cohen -- Bibliography -- Chapter 7: Morris Worm (Internet Worm) -- Bibliography -- Section II : The 1990s -- Chapter 8: Nahshon Even-Chaim -- Bibliography -- Chapter 9: Masters of Deception -- Bibliography -- Chapter 10: Operation Sun Devil -- Bibliography -- Chapter 11: Griffiss AFB and the Korean Atomic Research Institute -- Bibliography -- Chapter 12: Ehud Tenenbaum -- Bibliography -- Chapter 13: The Brotherhood of Warez -- Bibliography -- Section III : The 2000s -- Chapter 14: Mafiaboy -- Bibliography -- Chapter 15: Operation Shady RAT-2006 -- Bibliography -- Chapter 16: Night Dragon-2006 -- Bibliography -- Chapter 17: Zeus-2007 -- Infection Method -- Bibliography -- Chapter 18: Operation Aurora-2009 -- Bibliography -- Chapter 19: Stuxnet-2010 -- Bibliography -- Chapter 20: Operation Potao Express-2011 -- Bibliography -- Chapter 21: Saudi Aramco-2012 -- Bibliography -- Chapter 22: Target Data Breach-2013 -- Bibliography -- Chapter 23: Neiman Marcus-2013 -- Bibliography -- Chapter 24: Michaels Attack-2013 -- Bibliography -- Chapter 25: P.F. Chang-2013 -- Bibliography -- Chapter 26: Havex-2014 -- Bibliography -- Chapter 27: Shellshock-2014 -- Bibliography -- Chapter 28: Heartbleed-2014 -- Bibliography -- Chapter 29: Unicorn Bug-2014 -- Bibliography -- Chapter 30: Home Depot-2014 -- Bibliography -- Chapter 31: Sally Beauty Breach-2014 -- Bibliography -- Chapter 32: Goodwill-2014 -- Bibliography -- Chapter 33: Supervalu-2014
  • Bibliography -- Chapter 34: UPS-2014 -- Bibliography -- Chapter 35: Jimmy John's-2014 -- Bibliography -- Chapter 36: Dairy Queen-2014 -- Bibliography -- Chapter 37: Staples-2014 -- Bibliography -- Chapter 38: Kmart-2014 -- Bibliography -- Chapter 39: Sony Pictures-2014 -- Bibliography -- Chapter 40: JPMorgan Chase-2014 -- Bibliography -- Chapter 41: Anthem Healthcare Attack-2015 -- Bibliography -- Chapter 42: Ashley Madison Data Breach-2015 -- Bibliography -- Chapter 43: BlackEnergy-2015 -- SSHBear Door -- Bibliography -- Chapter 44: Sandworm-2015 -- Bibliography -- Chapter 45: HSBC Online Cyber-Attack-2016 -- Bibliography -- Chapter 46: Panama Papers-2016 -- Bibliography -- Appendix -- 1980s -- 1988 -- 1990s -- 2000 -- 2006 -- 2007 -- 2009 -- 2010 -- 2011 -- 2012 -- 2013 -- 2014 -- 2015 -- 2016 -- Index
Control code
EBC4929783
Dimensions
unknown
Edition
1st ed.
Extent
1 online resource (254 pages)
Form of item
online
Isbn
9781351651905
Isbn Type
(ebk)
Media category
computer
Media MARC source
rdamedia
Media type code
c
Note
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Sound
unknown sound
Specific material designation
remote

Library Locations

Processing Feedback ...