Introduction to Cyber Security



Yüklə 1,12 Mb.
səhifə72/72
tarix07.01.2024
ölçüsü1,12 Mb.
#210959
1   ...   64   65   66   67   68   69   70   71   72
Introduction-cyber-security

The Home Computer Security Centre. (2009, july 10). Onttrek Oct. 29, 2015 uit http://www.lockdown.co.uk: http://www.lockdown.co.uk/?pg=password_guide available under a Creative Commons Attribution-ShareAlike 2.0 License.
The Indian Express. (2008). Latest terror mail traced to Mumbai college. Mumbai: The Indian Express.
The Invention of Internet. (s.j.). Onttrek Dec. 20, 2015 uit http://www.history.com/topics/inventions/invention-of-the-internet
The Telegraph. (2015, Dec. 06). Onttrek Dec. 17, 2015 uit http://www.telegraphindia.com/1151207/jsp/business/story_57045.jsp#.VnJcINJ95dg
Times of India. (2009). Another techie held for duping Brainvisa. Pune: Times of India.


Tips for buying online. (2015, Oct. 02). Onttrek Oct. 29, 2015 uit Tips for buying online: https://www.qld.gov.au/law/your-rights/consumer-rights-complaints-and-scams/consumer- advice-rights-and-responsibilties/tips-to-become-a-smarter-shopper/tips-for-buying-online/ available under a Creative Commons Attribution 3.0 Australia (CC BY) licence.
Understanding Authentication. (2008, Feb. 14). Onttrek Sep. 26, 2015 uit Go4Experts: http://www.go4expert.com/articles/understanding-authentication-t8842/ available under Creative Commons with Attribution Required.
Urbas, G. (2012). Copyright, Crime and Computers: New Legislative Frameworks forIntellectual Property Rights Enforcement. Journal of International Commercial Law and Technology , 7 (1), 11-26.
US-CERT. (2014). Backoff Point-of-Sale Malware:Alert (TA14-212A). United States Computer Emergency Rediness Team.
US-CERT. (2008). Computer Forensics . Onttrek Dec. 20, 2015 uit https://www.us- cert.gov/sites/default/files/publications/forensics.pdf
USE MOBILE PHONES AS SECURELY AS POSSIBLE. (s.j.). Onttrek Oct. 29, 2015 uit
https://securityinabox.org/en/guide/smartphones available under a Creative Commons Attribution-Share Alike 3.0 Unported License.
Verma, D. (2012, Nov. 05). How To Identify Fake EMail And Trace Sender's Location. Onttrek Sep. 27, 2015 uit http://www.usethistip.com: http://www.usethistip.com/2012/11/how-to-identify-fake-email-and-trace.html available under a Creative Commons Attribution 3.0 License.
What Is A Software Patch? (2013, Nov. 08). Onttrek oct. 29, 2015 uit OSSWATCH: http://oss-watch.ac.uk/resources/softwarepatch available under a Creative Commons Attribution-ShareAlike 4.0 International License.
Working With Windows Firewall in Windows 7. (s.j.). Onttrek Oct. 29, 2015 uit http://www.utilizewindows.com: http://www.utilizewindows.com/7/networking/452-working- with-windows-firewall-in-windows-7
Yasmeen, A. (2013). Natgrid will deter terror. The Hindu dated15 Dec. 2013.
Yüklə 1,12 Mb.

Dostları ilə paylaş:
1   ...   64   65   66   67   68   69   70   71   72




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin