Search:

If it's smart, it's vulnerable / by Hypponen, Mikko,author.; Moss, Jeff(Computer security expert),writer of foreword.;
Foreword / Jeff Moss -- Preface -- Saab 9000 Turbo -- The good and bad of the internet: Prehistoric internet ; The first websites ; Linux is the world's most important system ; iPhone vs. supercomputer ; Online communities ; Money is data ; Codes all around us ; Geopolitics ; Security Tetris ; Who are we fighting? ; The Rolex -- Malware : then, now, and in the near future: The history of malware ; Smartphones and malware ; Law enforcement and malware ; Ransomware Trojans -- The human element: The two problems ; The heist ; CEO fraud ; Protecting company networks ; Bug bounties ; Wi-fi terms of use ; Mikko's tips ; Mikko's tips for the startup entrepreneur ; Boat for sale -- What if the network goes down?: Electrical networks ; Security factories ; Hypponen's law ; Dumb devices ; Regulation ; Care software updates -- Online privacy: Life without Google ; Murder charges never expire ; Is Google listening to you? ; Gorillas ; Startup business logic ; Biometrics ; Antisocial media ; Online influencing and elections ; Privacy is dead ; Before and after Gmail ; Encryption techniques ; Data is the new uranium ; CASE Vastaamo -- Cryptocurrencies: The value of money ; Blockchains ; The environmental impacts of Bitcoin ; Playing the market ; Ethereum, Monero, and Zcash ; NFT ; Bitcoin and crime ; Border guards vs. Bitcoin -- Technology, espionage, and warfare online: Cyberweapons ; Technology and warfare ; Under a false flag ; Concealability of cyberweapons ; The fog of cyberwar ; Case Prykarpattyaoblenergo ; Case Pyeongchang ; Governments as malware authors ; Russia and China ; Case Stuxnet ; Damage coverage ; Explosion at the White House ; My boycott of RSA, Inc. -- The future: Artificial intelligence ; Wolverines ; AI will take our jobs ; Smart malware ; Metaverse ; The technology of warfare ; "You are under arrest for a future murder" ; Those who can adapt will prosper ; Tesla ; Trends in technology.
Subjects: Internet of things; Computer security.;
Available copies: 1 / Total copies: 1
unAPI