A history of cyber security attacks: 1980 to present
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton, FL ; London ; New York
CRC Press
[2017]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XIV, 239 Seiten Illustrationen |
ISBN: | 9781498785860 1498785867 |
Internformat
MARC
LEADER | 00000nam a22000008c 4500 | ||
---|---|---|---|
001 | BV044364147 | ||
003 | DE-604 | ||
005 | 20170922 | ||
007 | t | ||
008 | 170622s2017 a||| |||| 00||| eng d | ||
020 | |a 9781498785860 |c hb : alk. paper: £ 38.99 |9 978-1-4987-8586-0 | ||
020 | |a 1498785867 |c hb : alk. paper |9 1-4987-8586-7 | ||
035 | |a (OCoLC)992986570 | ||
035 | |a (DE-599)BVBBV044364147 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-12 |a DE-634 | ||
084 | |a HIST |q DE-12 |2 fid | ||
100 | 1 | |a Middleton, Bruce |e Verfasser |4 aut | |
245 | 1 | 0 | |a A history of cyber security attacks |b 1980 to present |c Bruce Middleton |
264 | 1 | |a Boca Raton, FL ; London ; New York |b CRC Press |c [2017] | |
264 | 4 | |c © 2017 | |
300 | |a XIV, 239 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturangaben | ||
505 | 8 | |a The 1980s -- Kevin Mitnick -- The 414s -- Legion of doom -- Chaos computer club -- Fry guy -- Fred Cohen -- Morris worm (internet worm) -- The 1990s -- Nahshon even-chaim -- Masters of deception -- Operation sun devil -- Griffiss AFB and the Korean Atomic Research Institute -- Ehud Tenenbaum -- The Brotherhood of Warez -- The 2000s -- Mafiaboy -- Operation Shady Rat -- 2006 -- Night dragon -- 2006 -- Zeus -- 2007 -- Operation aurora -- 2009 -- Stuxnet -- 2010 -- Operation potao express -- 2011 -- Saudi Aramco -- 2012 -- Target data breach -- 2013 -- Neiman Marcus -- 2013 -- Michaels attack -- 2013 -- P.F. Chang -- 2013 -- Havex -- 2014 -- Shellshock -- 2014 -- Heartbleed -- 2014 -- Unicorn bug -- 2014 -- Home depot -- 2014 -- Sally beauty breach -- 2014 -- Goodwill -- 2014 -- Supervalu -- 2014 -- UPS -- 2014 -- Jimmy John's -- 2014 -- Dairy Queen -- 2014 -- Staples -- 2014 -- Kmart -- 2014 -- Sony Pictures -- 2014 -- JPMorgan chase -- 2014 -- Anthem Healthcare attack -- 2015 -- Ashley Madison data breach -- 2015 -- Blackenergy -- 2015 -- Sandworm -- 2015 -- HSBC online cyber attack -- 2016 -- Panama Papers -- 2016 -- Appendix A. | |
648 | 7 | |a Geschichte 1980-2016 |2 gnd |9 rswk-swf | |
650 | 4 | |a Geschichte | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberspace |0 (DE-588)4266146-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
653 | 0 | |a Cyberterrorism / History | |
653 | 0 | |a Cyberterrorism | |
653 | 6 | |a History | |
689 | 0 | 0 | |a Cyberspace |0 (DE-588)4266146-8 |D s |
689 | 0 | 1 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | 2 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 3 | |a Geschichte 1980-2016 |A z |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 1 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 2 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 1 | 3 | |a Geschichte 1980-2016 |A z |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | 1 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 2 | 2 | |a Geschichte 1980-2016 |A z |
689 | 2 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung BSB Muenchen - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029766723&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-029766723 | ||
942 | 1 | 1 | |c 609 |e 22/bsb |f 09049 |
942 | 1 | 1 | |c 306.09 |e 22/bsb |f 0905 |
942 | 1 | 1 | |c 302.2 |e 22/bsb |f 0905 |
942 | 1 | 1 | |c 609 |e 22/bsb |f 0905 |
942 | 1 | 1 | |c 306.09 |e 22/bsb |f 09049 |
942 | 1 | 1 | |c 609 |e 22/bsb |f 09048 |
942 | 1 | 1 | |c 302.2 |e 22/bsb |f 09049 |
942 | 1 | 1 | |c 302.2 |e 22/bsb |f 09048 |
942 | 1 | 1 | |c 306.09 |e 22/bsb |f 09048 |
Datensatz im Suchindex
_version_ | 1804177614304182272 |
---|---|
adam_text | Contents
Preface ix
About the Author xiii
Part I The 1980s
Chapter 1 Kevin Mitnick 3
Chapter 2 The 414s 11
Chapter 3 Legion of Doom 15
Chapter 4 Chaos Computer Club 19
Chapter 5 Fry Guy 25
Chapter 6 Fred Cohen 29
Chapter 7 Morris Worm (Internet Worm) 33
Part II The 1990s
Chapter 8 Nahshon Even-Chaim 39
Chapter 9 Masters of Deception 43
Chapter 10 Operation Sun Devil 47
Chapter 11 Griffiss AFB and the Korean Atomic
Research Institute 51
V
VI
CONTENTS
Chapter 12 Ehud Tenenbaum 61
Chapter 13 The Brotherhood of Warez 65
Part III The 2000s
Chapter 14 Mafiaboy 69
Chapter 15 Operation Shady RAT—2006 71
Chapter 16 Night Dragon—2006 81
Chapter 17 Zeus—2007 85
Chapter 18 O peration Aurora—2009 95
Chapter 19 Stuxnet—2010 99
Chapter 20 Operation Potao Express—2011 105
Chapter 21 Saudi Aramco—2012 113
Chapter 22 Target Data Breach—2013 119
Chapter 23 Neiman Marcus—2013 125
Chapter 24 Michaels Attack—2013 129
Chapter 25 P.F. Chang—2013 133
Chapter 26 H avex—2014 135
Chapter 27 Shellshock—2014 139
Chapter 28 Heartbleed—2014 143
Chapter 29 Unicorn Bug—2014 151
Chapter 30 Home Depot—2014 155
Chapter 31 Sally Beauty Breach—2014 159
Chapter 32 Goodwill—2014 163
Chapter 33 Supervalu—2014 167
Chapter 34 UPS—2014 171
Chapter 35 Jimmy John’s—2014 175
Chapter 36 Dairy Queen—2014 179
Chapter 37 Staples—2014 183
Chapter 38 Kmart—2014 185
CONTENTS
VII
Chapter 39 Sony Pictures—2014 187
Chapter 40 JPMorgan Chase—2014 191
Chapter 41 Anthem Healthcare Attack—2015 195
Chapter 42 Ashley Madison Data Breach—2015 201
Chapter 43 BlackEnergy—2015 207
Chapter 44 Sandworm—2015 215
Chapter 45 HSBC Online Cyber-Attack—2016 219
Chapter 46 Panama Papers—2016 221
Appendix 225
Index 235
|
any_adam_object | 1 |
author | Middleton, Bruce |
author_facet | Middleton, Bruce |
author_role | aut |
author_sort | Middleton, Bruce |
author_variant | b m bm |
building | Verbundindex |
bvnumber | BV044364147 |
contents | The 1980s -- Kevin Mitnick -- The 414s -- Legion of doom -- Chaos computer club -- Fry guy -- Fred Cohen -- Morris worm (internet worm) -- The 1990s -- Nahshon even-chaim -- Masters of deception -- Operation sun devil -- Griffiss AFB and the Korean Atomic Research Institute -- Ehud Tenenbaum -- The Brotherhood of Warez -- The 2000s -- Mafiaboy -- Operation Shady Rat -- 2006 -- Night dragon -- 2006 -- Zeus -- 2007 -- Operation aurora -- 2009 -- Stuxnet -- 2010 -- Operation potao express -- 2011 -- Saudi Aramco -- 2012 -- Target data breach -- 2013 -- Neiman Marcus -- 2013 -- Michaels attack -- 2013 -- P.F. Chang -- 2013 -- Havex -- 2014 -- Shellshock -- 2014 -- Heartbleed -- 2014 -- Unicorn bug -- 2014 -- Home depot -- 2014 -- Sally beauty breach -- 2014 -- Goodwill -- 2014 -- Supervalu -- 2014 -- UPS -- 2014 -- Jimmy John's -- 2014 -- Dairy Queen -- 2014 -- Staples -- 2014 -- Kmart -- 2014 -- Sony Pictures -- 2014 -- JPMorgan chase -- 2014 -- Anthem Healthcare attack -- 2015 -- Ashley Madison data breach -- 2015 -- Blackenergy -- 2015 -- Sandworm -- 2015 -- HSBC online cyber attack -- 2016 -- Panama Papers -- 2016 -- Appendix A. |
ctrlnum | (OCoLC)992986570 (DE-599)BVBBV044364147 |
era | Geschichte 1980-2016 gnd |
era_facet | Geschichte 1980-2016 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03914nam a22007338c 4500</leader><controlfield tag="001">BV044364147</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170922 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">170622s2017 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781498785860</subfield><subfield code="c">hb : alk. paper: £ 38.99</subfield><subfield code="9">978-1-4987-8586-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1498785867</subfield><subfield code="c">hb : alk. paper</subfield><subfield code="9">1-4987-8586-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)992986570</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044364147</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">HIST</subfield><subfield code="q">DE-12</subfield><subfield code="2">fid</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Middleton, Bruce</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A history of cyber security attacks</subfield><subfield code="b">1980 to present</subfield><subfield code="c">Bruce Middleton</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 239 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The 1980s -- Kevin Mitnick -- The 414s -- Legion of doom -- Chaos computer club -- Fry guy -- Fred Cohen -- Morris worm (internet worm) -- The 1990s -- Nahshon even-chaim -- Masters of deception -- Operation sun devil -- Griffiss AFB and the Korean Atomic Research Institute -- Ehud Tenenbaum -- The Brotherhood of Warez -- The 2000s -- Mafiaboy -- Operation Shady Rat -- 2006 -- Night dragon -- 2006 -- Zeus -- 2007 -- Operation aurora -- 2009 -- Stuxnet -- 2010 -- Operation potao express -- 2011 -- Saudi Aramco -- 2012 -- Target data breach -- 2013 -- Neiman Marcus -- 2013 -- Michaels attack -- 2013 -- P.F. Chang -- 2013 -- Havex -- 2014 -- Shellshock -- 2014 -- Heartbleed -- 2014 -- Unicorn bug -- 2014 -- Home depot -- 2014 -- Sally beauty breach -- 2014 -- Goodwill -- 2014 -- Supervalu -- 2014 -- UPS -- 2014 -- Jimmy John's -- 2014 -- Dairy Queen -- 2014 -- Staples -- 2014 -- Kmart -- 2014 -- Sony Pictures -- 2014 -- JPMorgan chase -- 2014 -- Anthem Healthcare attack -- 2015 -- Ashley Madison data breach -- 2015 -- Blackenergy -- 2015 -- Sandworm -- 2015 -- HSBC online cyber attack -- 2016 -- Panama Papers -- 2016 -- Appendix A.</subfield></datafield><datafield tag="648" ind1=" " ind2="7"><subfield code="a">Geschichte 1980-2016</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Geschichte</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberterrorism / History</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">History</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Geschichte 1980-2016</subfield><subfield code="A">z</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Geschichte 1980-2016</subfield><subfield code="A">z</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Geschichte 1980-2016</subfield><subfield code="A">z</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSB Muenchen - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029766723&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029766723</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">609</subfield><subfield code="e">22/bsb</subfield><subfield code="f">09049</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">306.09</subfield><subfield code="e">22/bsb</subfield><subfield code="f">0905</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">302.2</subfield><subfield code="e">22/bsb</subfield><subfield code="f">0905</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">609</subfield><subfield code="e">22/bsb</subfield><subfield code="f">0905</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">306.09</subfield><subfield code="e">22/bsb</subfield><subfield code="f">09049</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">609</subfield><subfield code="e">22/bsb</subfield><subfield code="f">09048</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">302.2</subfield><subfield code="e">22/bsb</subfield><subfield code="f">09049</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">302.2</subfield><subfield code="e">22/bsb</subfield><subfield code="f">09048</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">306.09</subfield><subfield code="e">22/bsb</subfield><subfield code="f">09048</subfield></datafield></record></collection> |
id | DE-604.BV044364147 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:50:52Z |
institution | BVB |
isbn | 9781498785860 1498785867 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029766723 |
oclc_num | 992986570 |
open_access_boolean | |
owner | DE-706 DE-12 DE-634 |
owner_facet | DE-706 DE-12 DE-634 |
physical | XIV, 239 Seiten Illustrationen |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | CRC Press |
record_format | marc |
spelling | Middleton, Bruce Verfasser aut A history of cyber security attacks 1980 to present Bruce Middleton Boca Raton, FL ; London ; New York CRC Press [2017] © 2017 XIV, 239 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Literaturangaben The 1980s -- Kevin Mitnick -- The 414s -- Legion of doom -- Chaos computer club -- Fry guy -- Fred Cohen -- Morris worm (internet worm) -- The 1990s -- Nahshon even-chaim -- Masters of deception -- Operation sun devil -- Griffiss AFB and the Korean Atomic Research Institute -- Ehud Tenenbaum -- The Brotherhood of Warez -- The 2000s -- Mafiaboy -- Operation Shady Rat -- 2006 -- Night dragon -- 2006 -- Zeus -- 2007 -- Operation aurora -- 2009 -- Stuxnet -- 2010 -- Operation potao express -- 2011 -- Saudi Aramco -- 2012 -- Target data breach -- 2013 -- Neiman Marcus -- 2013 -- Michaels attack -- 2013 -- P.F. Chang -- 2013 -- Havex -- 2014 -- Shellshock -- 2014 -- Heartbleed -- 2014 -- Unicorn bug -- 2014 -- Home depot -- 2014 -- Sally beauty breach -- 2014 -- Goodwill -- 2014 -- Supervalu -- 2014 -- UPS -- 2014 -- Jimmy John's -- 2014 -- Dairy Queen -- 2014 -- Staples -- 2014 -- Kmart -- 2014 -- Sony Pictures -- 2014 -- JPMorgan chase -- 2014 -- Anthem Healthcare attack -- 2015 -- Ashley Madison data breach -- 2015 -- Blackenergy -- 2015 -- Sandworm -- 2015 -- HSBC online cyber attack -- 2016 -- Panama Papers -- 2016 -- Appendix A. Geschichte 1980-2016 gnd rswk-swf Geschichte Computersicherheit (DE-588)4274324-2 gnd rswk-swf Cyberspace (DE-588)4266146-8 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Cyberterrorism / History Cyberterrorism History Cyberspace (DE-588)4266146-8 s Sicherheit (DE-588)4054790-5 s Internetkriminalität (DE-588)7864395-8 s Geschichte 1980-2016 z DE-604 Internet (DE-588)4308416-3 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s Digitalisierung BSB Muenchen - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029766723&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Middleton, Bruce A history of cyber security attacks 1980 to present The 1980s -- Kevin Mitnick -- The 414s -- Legion of doom -- Chaos computer club -- Fry guy -- Fred Cohen -- Morris worm (internet worm) -- The 1990s -- Nahshon even-chaim -- Masters of deception -- Operation sun devil -- Griffiss AFB and the Korean Atomic Research Institute -- Ehud Tenenbaum -- The Brotherhood of Warez -- The 2000s -- Mafiaboy -- Operation Shady Rat -- 2006 -- Night dragon -- 2006 -- Zeus -- 2007 -- Operation aurora -- 2009 -- Stuxnet -- 2010 -- Operation potao express -- 2011 -- Saudi Aramco -- 2012 -- Target data breach -- 2013 -- Neiman Marcus -- 2013 -- Michaels attack -- 2013 -- P.F. Chang -- 2013 -- Havex -- 2014 -- Shellshock -- 2014 -- Heartbleed -- 2014 -- Unicorn bug -- 2014 -- Home depot -- 2014 -- Sally beauty breach -- 2014 -- Goodwill -- 2014 -- Supervalu -- 2014 -- UPS -- 2014 -- Jimmy John's -- 2014 -- Dairy Queen -- 2014 -- Staples -- 2014 -- Kmart -- 2014 -- Sony Pictures -- 2014 -- JPMorgan chase -- 2014 -- Anthem Healthcare attack -- 2015 -- Ashley Madison data breach -- 2015 -- Blackenergy -- 2015 -- Sandworm -- 2015 -- HSBC online cyber attack -- 2016 -- Panama Papers -- 2016 -- Appendix A. Geschichte Computersicherheit (DE-588)4274324-2 gnd Cyberspace (DE-588)4266146-8 gnd Datensicherung (DE-588)4011144-1 gnd Sicherheit (DE-588)4054790-5 gnd Internetkriminalität (DE-588)7864395-8 gnd Internet (DE-588)4308416-3 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4266146-8 (DE-588)4011144-1 (DE-588)4054790-5 (DE-588)7864395-8 (DE-588)4308416-3 |
title | A history of cyber security attacks 1980 to present |
title_auth | A history of cyber security attacks 1980 to present |
title_exact_search | A history of cyber security attacks 1980 to present |
title_full | A history of cyber security attacks 1980 to present Bruce Middleton |
title_fullStr | A history of cyber security attacks 1980 to present Bruce Middleton |
title_full_unstemmed | A history of cyber security attacks 1980 to present Bruce Middleton |
title_short | A history of cyber security attacks |
title_sort | a history of cyber security attacks 1980 to present |
title_sub | 1980 to present |
topic | Geschichte Computersicherheit (DE-588)4274324-2 gnd Cyberspace (DE-588)4266146-8 gnd Datensicherung (DE-588)4011144-1 gnd Sicherheit (DE-588)4054790-5 gnd Internetkriminalität (DE-588)7864395-8 gnd Internet (DE-588)4308416-3 gnd |
topic_facet | Geschichte Computersicherheit Cyberspace Datensicherung Sicherheit Internetkriminalität Internet |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029766723&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT middletonbruce ahistoryofcybersecurityattacks1980topresent |