Operation Aurora

Results: 52



#Item
41Electronic warfare / Hacking / Cyberwarfare / Advanced persistent threat / Phishing / Symantec / Internet Security Alliance / Information security / Operation Aurora / Cybercrime / Computer security / Security

The Advanced Persistent Threat Practical Controls That Small and Medium-Sized Business Leaders Should Consider Implementing

Add to Reading List

Source URL: isalliance.org

Language: English - Date: 2013-06-13 14:09:17
42Cyberwarfare / Electronic warfare / China–United States relations / Hacking / Companies listed on the New York Stock Exchange / Operation Shady RAT / Operation Aurora / McAfee / LulzSec / Cybercrime / Advanced persistent threat / Security

White Paper Revealed: Operation Shady RAT By Dmitri Alperovitch, Vice President, Threat Research, McAfee An investigation of targeted intrusions into

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:08:18
43Alaska Railroad / Anchorage /  Alaska / Operation Lifesaver / Anchorage / Aurora Winter Train / Geography of Alaska / Alaska / Transport

Microsoft Word - Childrens Contest Rules and Directions.docx

Add to Reading List

Source URL: www.alaskarailroad.com

Language: English - Date: 2013-05-10 18:38:31
44National security / Lockheed CP-140 Aurora / Lockheed P-3 Orion / Operation Mobile / Boeing P-8 Poseidon / Royal Canadian Air Force / Maritime patrol aircraft / Hawker Siddeley Nimrod / Aurora / Signals intelligence / Aviation / Aircraft

DND photo 739-IMG0025 COMMENTARY The Aurora Chronicles

Add to Reading List

Source URL: www.journal.dnd.ca

Language: English - Date: 2014-07-09 14:49:37
45Literacy / Organisation for Economic Co-operation and Development / Reading / Northwest Territories / Numeracy / Basic skills / Financial literacy / Adult education / Aurora College / Education / Knowledge / Mathematics education

Backgrounder Programme for the International Assessment of Adult Competencies (PIAAC) October 8, 2013 The Programme for the International Assessment of Adult Competencies (PIAAC) literacy survey, known in Canada as the I

Add to Reading List

Source URL: www.ece.gov.nt.ca

Language: English - Date: 2013-10-08 12:18:13
46Energy conversion / Nuclear technology / Icebreakers / Research Icebreaker Aurora Borealis / Nuclear power stations / Nuclear-powered icebreaker / Nuclear marine propulsion / European Science Foundation / Nuclear power / Watercraft / Energy / Research vessels

European Research Icebreaker CONsortium AURORA BOREALIS Work package 4 : Financial Frameworks, Resource Engineering and Cost Forecasting for Multi-Country Commitments to Construction and Operation Deliverable 4.1 Verifie

Add to Reading List

Source URL: www.esf.org

Language: English - Date: 2012-02-24 08:55:21
47Hacking / Electronic warfare / Espionage / Computer crimes / Operation Aurora / Cyber spying / Huawei / Industrial espionage / Computer security / Cybercrime / Security / Cyberwarfare

SECTION 2: CHINA’S CYBER ACTIVITIES Introduction Since the Commission’s 2012 Annual Report to Congress, strong evidence has emerged that the Chinese government is directing and executing a large-scale cyber espionage

Add to Reading List

Source URL: origin.www.uscc.gov

Language: English - Date: 2014-04-28 12:20:22
48Hacking / Computer security / Computer network security / Cyber-security regulation / Advanced persistent threat / United States Department of Homeland Security / Attack / Operation Aurora / Cyberwarfare in the United States / Cyberwarfare / Security / Electronic warfare

Statement for the Record Richard Bejtlich Chief Security Officer Mandiant Corporation Before the

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2013-03-18 10:01:48
49Espionage / Hacking / Electronic warfare / Advanced persistent threat / Malware / Operation Aurora / Phishing / Denial-of-service attack / Targeted threat / Cyberwarfare / Cybercrime / Computer network security

Design and Operational Guide to Protect against "Advanced Persistent Threats" Revised 2nd edition A Approach to improve security measures aga in s t n e w cyb e r s e cu rit y th re ats

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2014-04-10 08:49:09
50Computer network security / Advanced persistent threat / Hacking / Malware / Operation Aurora / Phishing / Sourcefire / RSA / Vulnerability / Cyberwarfare / Computer security / System software

SANS Technology Institute Assessing Outbound

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 18:45:06
UPDATE