Ссылка | Дата | Объем в кбайтах | Число страниц | Справка |
After Stuxnet: The new rules of cyberwar/ Critical infrastructure providers face a rising tide of increasingly sophisticated and potentially destructive attacks.
By Robert L. Mitchell. |
2012 |
33 |
6 |
Целевая сетевая атака, один из видов кибероружия |
Anatomy Of A Targeted, Persistent Attack. |
Jan 27, 2010 |
1136 |
4 |
By Kelly Jackson Higgins |
Advanced Persistent Threats and other advances attacks. Threat analyses and defence stratagy. (Websense) |
2011 |
2239 |
13 |
|
Best Practices for Mitigating Advanced Persistent Threats. |
18 January 2012 |
356 |
20 |
|
Defending Against Advanced Persistent Threats. |
February 2010 |
581 |
6 |
|
Cybersecurity: Defending Against Advanced Persistent Threats. |
February 2011 |
252 |
4 |
|
The Advanced Persistent Threat Attack Model. |
2012 |
1201 |
12 |
|
Advanced persistent threat. From Wikipedia. |
2012 |
254 |
3 |
|
Best Practices for Mitigating Advanced Persistent Threats Lawrence Pingree, Neil MacDonald |
January 2012 |
356 |
20 |
|
Defeating Advanced Persistent Threat Malware |
2013 |
1305 |
16 |
|
New evidence shows Stuxnet used since at least 2007 |
February 26, 2013 |
1096 |
3 |
By Lucian Constantin |
How to seek and destroy advanced persistent threats |
Nov 17, 2016 |
362 |
4 |
Jian Zhen, InfoWorld |
Red alert! Beware of insiders bearing APTs |
Feb 28, 2017 |
212 |
2 |
InfoWorld, Roger A. Grimes |
Double Dragon APT41, a dual espionage and cyber crime operation SPECIAL REPORT |
2019 |
587 |
68 |
FireEye |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|