Stuxnet

Results: 312



#Item
81Hacking / Security / Computer security / Military technology / Stuxnet / International Multilateral Partnership Against Cyber Threats / Cyber-security regulation / Cyberwarfare in the United States / Cyberwarfare / Computer crimes / Electronic warfare

The Impact of Cyber Security on the South Australian Defence Industry SADILP 2013 Mathew Borgas, Jude Kennedy, Tracey Hart, Paul Sykes

Add to Reading List

Source URL: www.dtc.org.au

Language: English - Date: 2014-02-06 17:47:12
82Security / United States Cyber Command / Stuxnet / Computer crime / Cyberterrorism / National Security Agency / Duqu / Computer security / Information warfare / Cyberwarfare / Military science / War

IRIE International Review of Information Ethics VolIngo Ruhmann:

Add to Reading List

Source URL: www.i-r-i-e.net

Language: English - Date: 2014-05-21 07:52:15
83Modern art / Julian Stanczak / Josef Albers / Hoff / Stuxnet / Abstract art / Aesthetics / Visual arts / Painting / Art movements

Schultz, Charles. James Hoff: Skywiper, The Brooklyn Rail, December 18, 2014, online. JAMES HOFF Skywiper by Charles Schultz CALLICOON FINE ARTS | NOVEMBER 2 – DECEMBER 21, 2014 James Hoff makes paintings with a print

Add to Reading List

Source URL: callicoonfinearts.com

Language: English - Date: 2014-12-19 11:23:25
84Software / Stuxnet / Shellcode / Windows NT 4.0 / Microsoft Windows / Cyberwarfare / System software / Duqu

Note: Because Type 1 font programs were originally produced and were carefully checked only within Adobe Systems, Type 1 BuildChar was designed with the expectation that only errorfree Type 1 font programs would be prese

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2013-03-19 04:58:41
85Industrial automation / SCADA / Hacking / Military technology / Stuxnet / Computer security / Industrial control system / Security / Cyber security standards / Technology / Telemetry / Cyberwarfare

cybersecurity.thalesgroup.com.au In this white paper Modern control systems are increasingly complex, digital and connected. Where in the past these were isolated from other networks, today’s operators typically requi

Add to Reading List

Source URL: cybersecurity.thalesgroup.com.au

Language: English - Date: 2014-08-21 21:49:46
86Cyberwarfare / Rootkits / Stuxnet / Iran / Internet censorship / Ali Khamenei / Asia / Nuclear program of Iran / Iran–United States relations

Iranian Internet Infrastructure and Policy Report Special Edition The Rouhani Review (2013–15) February 2015 smallmedia.org.uk

Add to Reading List

Source URL: smallmedia.org.uk

Language: English - Date: 2015-03-19 13:05:36
87Computer crimes / Technology / Computer security / Electronic warfare / Military technology / Stuxnet / Insurance / Risk management / Liability insurance / Cyberwarfare / Security / Hacking

What isn’t Vulnerable to Cyber Attack? IT-based technologies have facilitated immense advances in practically all human endeavors. Huge upside, but with these capabilities comes a spectrum of (growing) risks relating t

Add to Reading List

Source URL: www.partnerre.com

Language: English - Date: 2014-11-19 11:24:00
88Infrastructure / United States Department of Homeland Security / Cyberwarfare / SCADA / Critical infrastructure protection / Resilience / Computer security / Stuxnet / Information security / National security / Security / Public safety

PDF Document

Add to Reading List

Source URL: utmea.enea.it

Language: English - Date: 2011-08-26 05:32:12
89Antivirus software / Social engineering / Spyware / Trojan horses / Ransomware / Computer virus / Stuxnet / Computer worm / Scareware / Malware / System software / Software

PandaLabs Quarterly Report April - June 2012 01 Introduction

Add to Reading List

Source URL: expo-itsecurity.ru

Language: English - Date: 2012-08-14 07:16:50
90Cyberwarfare / Videotelephony / Computer network security / Malware / Stuxnet / Targeted threat / Denial-of-service attack / Social engineering / Voice over IP / Software / Computing / System software

The Slingshot Project Measuring, analyzing, and defending against targeted attacks Stevens Le Blond Software security model

Add to Reading List

Source URL: www.dfn-cert.de

Language: English - Date: 2015-03-06 09:40:10
UPDATE