text
stringlengths 4
429
|
---|
nnakute uurimisel. Retrieved on |
March 10, 2008, from http://www.epl.ee/artikkel/392271. |
Streem. 2008. Westpac Glitch Leaves Customers Cashless. Retrieved on August 13, 2008, |
from http://www.streem.com.au/breaking-news/6326-thousands-blocked-as-westpaccrashes. |
Sun Tzu [Zi]. 1963. The Art of War (trans. Samuel B. Griffith). London: Oxford University Press. |
Surface Combatants. 2008. Retrieved on April 9, 2008, from http://www.sinodefence.com/ |
navy/surface/default.asp. |
Taiwan Assassin. 2004. Retrieved on April 7, 2008, from http://www.tzengs.com/News/ |
Assasin/photos_.htm. |
Talmadge, Caitlin. 2008. Closing Time: Assessing the Iranian Threat to the Strait of Hormuz. |
Retrieved on August 2, 2008, from http://belfercenter.ksg.harvard.edu/publication/ |
18409/closing_time.html. |
Tellis, Ashley. 2007. China |
s Military Space Strategy. Retrieved on January 28, 2008, from |
http://www.informaworld.com/smpp/section?content=a780978527&fulltext=713240928. |
Thai Truckers Join Global Fuel Price Protest. 2008. Retrieved on August 1, 2008, from |
http://business.smh.com.au/business/thai-truckers-join-global-fuel-price-protest-200806112oy3.html. |
The Christian Science Monitor. 2006. China's new shopping craze: 'team buying'. |
Retrieved on August 1, 2008, from http://articles.moneycentral.msn.com/Savingand |
Debt/FindDealsOnline/ChinasNewShoppingCrazeTeamBuying.aspx. |
The Cyber Raiders Hitting Estonia. 2007. Retrieved on February 12, 2008, from |
http://news.bbc.co.uk/2/hi/europe/6665195.stm. |
The Passion of Anonymous. 2008. Retrieved on July 14, 2008, from |
http://www.newsweek.com/id/109410. |
Thornburgh, Nathan. 2005. Inside the Chinese Hack Attack. Retrieved on July 21, |
2008, from http://www.time.com/time/nation/article/0,8599,1098371,00.html. |
Thornburgh, Nathan. 2005. The Invasion of the Chinese Cyberspies. Retrieved on March 2, |
2008 from http://www.time.com/time/magazine/article/0,9171,1098961,00.html. |
Tkacik, John J Jr. 2007. Trojan Dragons: China |
s Cyber Threat. Retrieved on March 20, |
2008, from http://www.heritage.org/Research/asiaandthepacific/bg2106.cfm. |
Towards one laptop per child. 2006. Retrieved on July 28, 2008, from |
http://www.sunstar.com.ph/static/ceb/2006/07/24/bus/towards.one.laptop.per.child.html. |
Trahan, Jason. 2008. Teen wouldn |
t quit his hacking ways, FBI says. Retrieved on August |
31, 2008, from http://www.dallasnews.com/sharedcontent/dws/news/nation/stories/DNswating_31met.ART0.West.Edition1.4ddc7cf.html. |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
2008 Jason Fritz |
United States General Accounting Office (GAO), Information Security: Code Red, Code Red II, and SirCam |
Attacks Highlight Need for Proactive Measures, Statement of Keith A. Rhodes, Chief Technologist, August |
29, 2001 (GAO-01-1073T), see http://www.gao.gov/new.items/d011073t.pdf |
Use of Social Network Websites in Investigations. 2008. Retrieved on August 12, 2008, from |
http://en.wikipedia.org/wiki/Use_of_social_network_websites_in_investigations. |
Vallance, Chris. 2008. US Seeks Terrorists In The Web Worlds. Retrieved on March 8, 2008, |
from http://news.bbc.co.uk/2/hi/technology/7274377.stm. |
Vamosi, Robert. 2008. Anonymous posts another video against Scientology. Retrived on July |
14, 2008, from http://news.cnet.com/8301-10789_3-9859513-57.html. |
VoIPWiki Blog. 2006. Skype Protocol Has Been Cracked. Retrieved on July 14, 2008, |
from http://www.voipwiki.com/blog/?p=16. |
Wagstaff, Jeremy. 2005. The First U.S.- China Cyberwar. Retrieved on July 27, 2008, |
from http://loosewire.typepad.com/blog/2005/12/the_first_uschi.html. |
Warrick, Joby and Johnson, Carrie. 2008. Chinese Spy Slept In US For 2 Decades. Retrieved |
on April 3, 2008, from http://www.washingtonpost.com/wp-dyn/content/story/ |
2008/04/02/ST2008040204050.html. |
Warren, Peter. 2006. Smash and grab, the hi-tech way. Retrieved on July 18, 2008, |
from http://technology.guardian.co.uk/weekly/story/0,,1689093,00.html. |
Waterman, Shaun. 2008. Analysis DHS Stages Cyberwar Exercise. Retrieved on April 10, |
2008, from http://www.spacewar.com/reports/Analysis_DHS_stages_cyberwar_ |
exercise_999.html. |
Waterman, Shaun. 2008. Analysis: Russia-Georgia Cyber War Doubted. Retrieved on August |
18, 2008, from http://www.spacewar.com/reports/Analysis_Russia-Georgia_cyber |
war_doubted_999.html. |
Waterman, Shaun. 2008. Chinese Cyberattacks Target US Think Tanks. Retrieved on March |
8, 2008, from http://www.spacewar.com/reports/Chinese_Cyberattacks_Target_ |
US_Think_Tanks_999.html. |
Waterman, Shaun. 2007. China Has .75 Million Zombie Computers In US. Retrieved on |
March 17, 2008, from http://www.upi.com/International_Security/Emerging_Threats/ |
Briefing/2007/09/17/china_has_75m_zombie_computers_in_us/7394/. |
Waterman, Shaun. 2007. Who cyber smacked Estonia? Retrieved on January 17, 2008 from |
http://www.upi.com/Security_Terrorism/Analysis/2007/06/11/analysis_who_ |
cyber_smacked_estonia/2683/. |
Wayner, Peter. 1999. Hacker Attacks on Military Networks May Be Closer to Espionage. |
Retrieved on August 10, 2008, from http://www.landfield.com/isn/mail-archive/1999/ |
Mar/0022.html. |
Weber, Harry. 2008. FAA Says Communications Breakdown Delaying Flights. Retrieved on |
August 28, 2008, from http://news.yahoo.com/s/ap/20080826/ap_on_re_us/faa_ |
communication_breakdown;_ylt=A0WTUeXUlbRISucAawSs0NUE. |
Weber, Tim. 2007. Criminals may overwhelm the web. Retrieved on August 1, 2008, from |
http://news.bbc.co.uk/1/hi/business/6298641.stm. |
Wei, Michael. 2008. Facebook Targets China, World |
s Biggest Web Market. Retrieved on |
June 20, 2008, from http://www.reuters.com/article/ousiv/idUSSHA17883120080620. |
Wensheng, Wang. 2006. Bridging the Digital Divide Inside China. Retrieved on July 28, |
2008, from http://zoushoku.narc.affrc.go.jp/ADR/AFITA/afita/afita-conf/2002/part7/ |
p533.pdf. |
WFTV. 2008. Girls Record Brutal Attack On Teen To Allegedly Post on YouTube. Retrieved |
On May 10, 2008, from http://www.wftv.com/news/15817394/detail.html. |
Winkler, Ira. 2005. Guard Against Titan Rain Hackers. Retrieved on January 8, 2008, from |
http://www.computerworld.com/securitytopics/security/story/0,10801,105585,00.html. |
Winkler, Ira. 2007. How To Take Down The Power Grid. Retrieved on June 7, 2008, from |
http://www.internetevolution.com/author.asp?section_id=515&doc_id=136047. |
Winkler, Tim. 2003. Dragonflies Prove Clever Predators. Retrieved on February 10, 2008, |
from http://info.anu.edu.au/ovc/media/Media_Releases/_2003/_030605Dragonflies.asp. |
Winn, Patrick. 2008. Hypothetical attack on U.S. outlined by China. Retrieved on |
February 23, 2008, from http://www.airforcetimes.com/news/2008/01/airforce_ |
china_strategy_080121/. |
Whitney, Mike. 2008. Three Internet Cables Slashed In A Week. Retrieved on July 4, 2008, |
Culture Mandala, Vol. 8, No. 1, October 2008, pp.28-80 |
Copyright |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.