Back to Results
First PageMeta Content
Espionage / Computing / Trojan horse / Malware / Ghost Rat / Email / Computer virus / Cyber spying / Antivirus software / Spyware / Social engineering / Security


Lecture 30: Mounting Targeted Attacks with Trojans and Social Engineering — Cyber Espionage Lecture Notes on “Computer and Network Security” by Avi Kak ([removed]) April 22, 2014
Add to Reading List

Document Date: 2014-04-22 16:08:25


Open Document

File Size: 300,52 KB

Share Result on Facebook

Company

Microsoft Corporation / Internet Explorer Microsoft Corporation / C. C / /

Country

United States / /

/

IndustryTerm

defense contractor / linux utilities / system-oriented software / web browser / otherwise secure network / anti-virus software updates / /

OperatingSystem

Linux / /

Organization

A. Since / Purdue University / /

Person

Avi Kak / Avinash Kak / Joe Smoothseller / Bob Clueless / /

/

Position

defense contractor / high official / /

Product

Microsoft Corporation Portable Audio Device / /

ProvinceOrState

Washington / /

Technology

LAN / firewall / Linux / Avi / anti-virus software / military hardware / /

URL

http /

SocialTag