Amazon cover image
Image from Amazon.com

A history of cyber security attacks : 1980 to present / Bruce Middleton.

By: Publisher: Boca Raton, FL : CRC Press, Taylor & Francis Group, [2017]Description: xiv, 239 pages ; 25 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781498785860 (hb : alk. paper)
Subject(s): Genre/Form: LOC classification:
  • HV6773.15.C97 M53 2017
Contents:
The 1980s -- Kevin Mitnick -- The 414s -- Legion of doom -- Chaos computer club -- Fry guy -- Fred Cohen -- Morris worm (internet worm) -- The 1990s -- Nahshon even-chaim -- Masters of deception -- Operation sun devil -- Griffiss AFB and the Korean Atomic Research Institute -- Ehud Tenenbaum -- The Brotherhood of Warez -- The 2000s -- Mafiaboy -- Operation Shady Rat - 2006 -- Night dragon - 2006 -- Zeus - 2007 -- Operation aurora - 2009 -- Stuxnet - 2010 -- Operation potao express - 2011 -- Saudi Aramco - 2012 -- Target data breach - 2013 -- Neiman Marcus - 2013 -- Michaels attack - 2013 -- P.F. Chang - 2013 -- Havex - 2014 -- Shellshock - 2014 -- Heartbleed - 2014 -- Unicorn bug - 2014 -- Home depot - 2014 -- Sally beauty breach - 2014 -- Goodwill - 2014 -- Supervalu - 2014 -- UPS - 2014 -- Jimmy John's - 2014 -- Dairy Queen - 2014 -- Staples - 2014 -- Kmart - 2014 -- Sony Pictures - 2014 -- JPMorgan chase - 2014 -- Anthem Healthcare attack - 2015 -- Ashley Madison data breach - 2015 -- Blackenergy - 2015 -- Sandworm - 2015 -- HSBC online cyber attack - 2016 -- Panama Papers - 2016 -- Appendix A.
Item type: BOOKS
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Current library Home library Call number Status Barcode
Alfaisal University On Shelf Alfaisal University On Shelf HV6773.15.C97 M53 2017 (Browse shelf(Opens below)) Available AU00000000012244
Total holds: 0
Browsing Alfaisal University shelves, Shelving location: On Shelf Close shelf browser (Hides shelf browser)
No cover image available
HV6773 .W655 2018 You'll see this message when it is too late : HV6773.15.C92 S36 2016 Online health and safety : HV6773.15.C97 G85 2017 Inside the enemy's computer : HV6773.15.C97 M53 2017 A history of cyber security attacks : HV6773.15.C97 S355 2024 Weaponizing cyberspace : HV6773.15.C97 S36 2019 The perfect weapon : HV6773.15.C97 V35 2018 Cyber strategy :

The 1980s -- Kevin Mitnick -- The 414s -- Legion of doom -- Chaos computer club -- Fry guy -- Fred Cohen -- Morris worm (internet worm) -- The 1990s -- Nahshon even-chaim -- Masters of deception -- Operation sun devil -- Griffiss AFB and the Korean Atomic Research Institute -- Ehud Tenenbaum -- The Brotherhood of Warez -- The 2000s -- Mafiaboy -- Operation Shady Rat - 2006 -- Night dragon - 2006 -- Zeus - 2007 -- Operation aurora - 2009 -- Stuxnet - 2010 -- Operation potao express - 2011 -- Saudi Aramco - 2012 -- Target data breach - 2013 -- Neiman Marcus - 2013 -- Michaels attack - 2013 -- P.F. Chang - 2013 -- Havex - 2014 -- Shellshock - 2014 -- Heartbleed - 2014 -- Unicorn bug - 2014 -- Home depot - 2014 -- Sally beauty breach - 2014 -- Goodwill - 2014 -- Supervalu - 2014 -- UPS - 2014 -- Jimmy John's - 2014 -- Dairy Queen - 2014 -- Staples - 2014 -- Kmart - 2014 -- Sony Pictures - 2014 -- JPMorgan chase - 2014 -- Anthem Healthcare attack - 2015 -- Ashley Madison data breach - 2015 -- Blackenergy - 2015 -- Sandworm - 2015 -- HSBC online cyber attack - 2016 -- Panama Papers - 2016 -- Appendix A.

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu