Developing a Reliable Methodology for Assessing the Computer Network Operations Threat of Iran
暂无分享,去创建一个
[1] D. Drew. Mark , 2005, Neonatal Network.
[2] Christopher Brown,et al. Developing a reliable methodology for assessing the computer network operations threat of North Korea , 2004 .
[3] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[4] Doc Searls. Hacking democracy , 2004 .
[5] Marianna Tax Choldin. Information Technology and World Politics , 2003, J. Documentation.
[6] Brian Nicholson,et al. Building Iran's Software Industry: An Assessment of Plans and Prospects , 2003 .
[7] Clay Wilson. Information Warfare and Cyberwar: Capabilities and Related Policy Issues , 2003 .
[8] Kenneth Katzman. Iran: Arms and Weapons of Mass Destruction Suppliers , 2003 .
[9] Laleh D. Ebrahimian. Socio-Economic Development in Iran through Information and Communications Technology , 2003 .
[10] John Van Beveren,et al. A CONCEPTUAL MODEL OF HACKER DEVELOPMENT AND MOTIVATIONS , 2001 .
[11] Akbar Shokoohi. Public Administrative Reform for Economic Transformation in Iran: The Legal Framework , 1996 .
[12] P. Harwood. Michael , 1985 .
[13] Of references. , 1966, JAMA.