12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

22 2. POLITICAL CYBER ATTACK COMES OF AGE IN 20079. Prea<strong>to</strong>ni R. Zone-H. Retrieved August 16, 2012, from Zone-H: http://www.zone-h.org; March 9, 2002.10. Franklin J, Paxson V, Perrig A, Savage S. In: An inquiry in<strong>to</strong> the nature and causes of the wealth of internet miscreants.CCS 2007. New York: ACM; 2007, p. 375–88.11. Tallinn-Life (undated <strong>to</strong>urist information). The Last Soviet in Tallinn: Saga of the ‘Bronze Soldier’. http://www.tallinn-life.com/tallinn/es<strong>to</strong>nian-russian-relations [accessed Oc<strong>to</strong>ber 7, 2012].12. Ibid.13. Sridhar S. Denial of Service attacks and mitigation techniques: Real time implementation with detailed analysis. Retrieved8 18, 2012, from SANS.org: http://www.sans.org/reading_room/whitepapers/detection/denial-serviceattacks-mitigation-techniques-real-time-implementation-detailed-analysi_33764;2011.14. Franklin J, Paxson V, Perrig A, Savage S. In: An inquiry in<strong>to</strong> the nature and causes of the wealth of internetmiscreants. CCS 2007. New York: ACM; 2007, p. 375–88.15. Davis J. Hackers take down the most wired country in Europe. Wired Magazine 2007.16. Kaeo M. <strong>Cyber</strong> Attacks on Es<strong>to</strong>nia Short Synopsis. Retrieved August 16, 2012, from Double Shot Security: http://www.doubleshotsecurity.com/pdf/NANOG-eesti.pdf; June 3, 2007.17. Shachtman N. Kremlin kids: we launched the Es<strong>to</strong>nian <strong>Cyber</strong> War. Wired. Retrieved Oc<strong>to</strong>ber 28, 2012 from http://www.wired.com/dangerroom/2009/03/pro-kremlin-gro/; March 11, 2009.18. Rodgers J. Putin’s next generation make their mark. BBC News. Retrieved Oc<strong>to</strong>ber 28, 2012 from http://news.bbc.co.uk/2/hi/europe/6624549.stm; May 4, 2007.19. Hackers and the Kremlin: Nashi Exposed. The Economist. Retrieved Oc<strong>to</strong>ber 28, 2012 from http://www.economist.com/blogs/easternapproaches/2012/02/hackers-and-kremlin; February 9, 2012.20. Sridhar S. Denial of Service attacks and mitigation techniques: real time implementation with detailed analysis. Retrieved8 18, 2012, from SANS.org: http://www.sans.org/reading_room/whitepapers/detection/denial-serviceattacks-mitigation-techniques-real-time-implementation-detailed-analysi_33764;2011.21. Pathan A-MK, Buyya R. A taxonomy and survey of content delivery networks. Parkville: University ofMelbourne; 2007.22. Pathan A-MK, Buyya R. A taxonomy and survey of content delivery networks. Parkville: University ofMelbourne; 2007.23. Glotzbach M. Google Apps and Government. Retrieved August 16, 2012, from Official Google Enterprise Blog:http://googleenterprise.blogspot.com/2009/09/google-apps-and-government.html; September 15, 2009.24. Kohn P. Image-File: Tallinn Bronze Soldier—May 2006—029.jpg. Retrieved Oc<strong>to</strong>ber 7, 2012: http://en.wikipedia.org/wiki/File:Tallinn_Bronze_Soldier_-_May_2006_-_029.jpg; 2006.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!