Operation Aurora

Results: 52



#Item
1A Longitudinal Study of the Little Endian That Could Andrew White Senior Security Researcher Secureworks

A Longitudinal Study of the Little Endian That Could Andrew White Senior Security Researcher Secureworks

Add to Reading List

Source URL: files.sans.org

Language: English - Date: 2016-04-15 13:43:25
2Fault-tolerant Quantum Computing Bryan Eastin Northrop Grumman Corporation Aurora, CO  December 2014

Fault-tolerant Quantum Computing Bryan Eastin Northrop Grumman Corporation Aurora, CO December 2014

Add to Reading List

Source URL: www.qec14.ethz.ch

Language: English - Date: 2014-12-19 04:03:41
3ThetaRay_Logo_Options_Draft7

ThetaRay_Logo_Options_Draft7

Add to Reading List

Source URL: www.thetaray.com

Language: English - Date: 2014-12-06 20:04:03
4

PDF Document

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-10-27 01:18:20
5WHITE PAPER  LESS THAN ZERO: A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model

WHITE PAPER LESS THAN ZERO: A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-04-30 23:03:41
6Data Sheet  McAfee Embedded Control System integrity, change control, and policy compliance in one solution for integrated control systems

Data Sheet McAfee Embedded Control System integrity, change control, and policy compliance in one solution for integrated control systems

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-28 13:56:11
7Computer network security / Malware / Software testing / Zero-day attack / Vulnerability / FireEye /  Inc. / Operation Aurora / Exploit / Targeted threat / Computer security / Cyberwarfare / Hacking

WHITE PAPER LESS THAN ZERO: A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-05-01 03:59:23
8Solution Brief  Abuse of Trust Preying upon those who trust.  The adage “trust is earned, not given” rings true; we have all seen examples of

Solution Brief Abuse of Trust Preying upon those who trust. The adage “trust is earned, not given” rings true; we have all seen examples of

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 18:25:30
9Solution Brief  Abuse of Trust Preying upon those who trust.  The adage “trust is earned, not given” rings true; we have all seen examples of

Solution Brief Abuse of Trust Preying upon those who trust. The adage “trust is earned, not given” rings true; we have all seen examples of

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 18:25:30
10Solution Brief  Abuse of Trust Preying upon those who trust.  The adage “trust is earned, not given” rings true; we have all seen examples of

Solution Brief Abuse of Trust Preying upon those who trust. The adage “trust is earned, not given” rings true; we have all seen examples of

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 18:25:30