SØG - mellem flere end 8 millioner bøger:

Søg på: Titel, forfatter, forlag - gerne i kombination.
Eller blot på isbn, hvis du kender dette.

Viser: If It's Smart, It's Vulnerable

If It's Smart, It's Vulnerable, 1. udgave
Søgbar e-bog

If It's Smart, It's Vulnerable Vital Source e-bog

Mikko Hypponen
(2022)
John Wiley & Sons
232,00 kr.
Leveres umiddelbart efter køb
If It's Smart, It's Vulnerable

If It's Smart, It's Vulnerable

Mikko Hyppönen
(2022)
Sprog: Engelsk
John Wiley & Sons, Limited
297,00 kr.
ikke på lager, Bestil nu og få den leveret
om ca. 10 hverdage

Detaljer om varen

  • 1. Udgave
  • Vital Source searchable e-book (Reflowable pages)
  • Udgiver: John Wiley & Sons (Juni 2022)
  • ISBN: 9781119895206

Reimagine the future of the internet

All our devices and gadgets--from our refrigerators to our home security systems, vacuum cleaners, and stereos--are going online, just like our computers did. But once we’ve successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters?

In If It’s Smart, It’s Vulnerable, veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best--and worst--things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing. In this book, the author explores the transformative potential of the future of the internet, as well as those things that threaten its continued existence: government surveillance, censorship, organized crime, and more.

Readers will also find:

  • Insightful discussions of how law enforcement and intelligence agencies operate on the internet
  • Fulsome treatments of how money became data and the impact of the widespread use of mobile supercomputing technology
  • Explorations of how the internet has changed the world, for better and for worse
  • Engaging stories from Mikko's 30-year career in infosec

Perfect for anyone seeking a thought-provoking presentation of some of the most pressing issues in cybersecurity and technology, If It’s Smart, It’s Vulnerable will also earn a place in the libraries of anyone interested in the future of the internet.

Licens varighed:
Bookshelf online: 5 år fra købsdato.
Bookshelf appen: ubegrænset dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 10 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • Hardback: 288 sider
  • Udgiver: John Wiley & Sons, Limited (August 2022)
  • ISBN: 9781119895183

The Internet brings us incredible new opportunities, but also chilling new risks. Mikko Hypponen has spent 30 years investigating the dark sides of the net: online crime, data leaks, security vulnerabilities and online espionage. Through examples and case studies, he investigates how we got here and where are we going next.

This book is an insider's look into how the Internet changed the world for the better and for the worse. It is about the internet and us. The internet has changed from a technical curiosity to a seamless part of our everyday life. Eventually it will become invisible; something we take for granted and assume to be available always and everywhere. This is what happened with the electricity grid.

This book also explores the things that threaten the future of the internet: organized online crime gangs, governmental surveillance and censorship, and the fight over control of the internet. It also looks at how law enforcement and intelligence agencies operate on the internet, how money became data and the myriad, often surprising impacts that occur when we all carry a supercomputer in our pockets.

Foreword: Jeff Moss xiii Preface xvii Saab 9000 Turbo xxi The Good and the Bad of the Internet 1 Prehistoric Internet 2 The First Websites 5 Linux Is the World's Most Important System 7 iPhone vs. Supercomputer 10 Online Communities 11 Money Is Data 13 Codes All Around Us 14 Geopolitics 17 Security Tetris 21 Who Are We Fighting? 24 Schoolboys 24 Spammer 26 Professional Cybercrime Groups 28 Extremists 29 The Rolex 30 Malware--Then, Now, and in the Near Future 33 The History of Malware 34 Viruses on Floppies 34 Brain.A 35 File Viruses 43 Macro Viruses 43 Email Worms 45 Internet Worms 46 The Virus Wars 49 Web Attacks 51 Mobile Phone Viruses 51 Worms on Social Media 54 Smartphones and Malware 55 Law Enforcement Malware 57 Case R2D2 58 Cracking Passwords 59 When a Hacker Spilled Her Coffee 60 Ransomware Trojans 61 The History of Ransomware Trojans 61 Cryptolocker 64 Honest Criminals 65 Notpetya 65 Case Maersk 67 Wannacry 71 My Week with Wannacry 72 Targeted Ransomware Trojans 76 Ransomware Trojans v2 77 The Human Element 79 The Two Problems 80 The Heist 82 CEO Fraud 89 Touring the Headquarters 92 Protecting Company Networks 95 Zero Trust 100 Bug Bounties 101 Wi- Fi Terms of Use 110 Mikko's Tips 112 Mikko's Tips for the Startup Entrepreneur 114 Boat for Sale 118 What If the Network Goes Down? 121 Electrical Networks 122 Security in Factories 124 A Search Engine for Computers 126 Slammer 128 Hypponen's Law 130 Dumb Devices 132 Regulation 134 Car Software Updates 136 Online Privacy 137 Life Without Google 138 Murder Charges Never Expire 139 Is Google Listening to You? 142 Gorillas 143 Startup Business Logic 145 Biometrics 147 Antisocial Media 149 Online Influencing and Elections 151 Privacy Is Dead 153 Before and After Gmail 156 Encryption Techniques 160 Perfect Encryption 160 Unbreakable Encryption 161 Criminal Use of Encryption Systems 162 Data Is The New Uranium 166 CASE Vastaamo 168 Patient Registry 169 Technologies 170 Vastaamo.tar 171 Extortion Messages 173 The Hunt for the TAR File 175 Innocent Victims 177 Cryptocurrencies 179 The Value of Money 180 Blockchains 181 Blockchain Applications 182 Blockchains and Money 183 The Environmental Impacts of Bitcoin 185 Playing the Market 187 Ethereum, Monero, and Zcash 189 Nft 191 Bitcoin and Crime 193 Border Guards vs. Bitcoin 195 Technology, Espionage, and Warfare Online 199 Cyberweapons 200 Lunch Break at Google 201 Technology and Warfare 202 Under a False Flag 204 Concealability of Cyberweapons 205 The Fog of Cyberwar 207 Case Prykarpattyaoblenergo 211 Case Pyeongchang 213 Governments as Malware Authors 214 Russia and China 216 Case Stuxnet 217 Damage Coverage 226 Explosion at the White House 227 My Boycott of RSA, Inc 229 The Future 233 Artificial Intelligence 234 Wolverines 237 AI Will Take Our Jobs 238 Smart Malware 239 Metaverse 240 The Technology of Warfare 241 "You Are Under Arrest for a Future Murder" 242 Those Who Can Adapt Will Prosper 243 Tesla 245 Trends in Technology 247 Coda 249 Index 251
De oplyste priser er inkl. moms

Andre har også købt:

How to Measure Anything - Finding the Value of Intangibles in Business, 3. udgave
How to Measure Anythi...
Af Douglas W. Hubba...
Pris: 499,00 kr.

Polyteknisk Boghandel

har gennem mere end 50 år været studieboghandlen på DTU og en af Danmarks førende specialister i faglitteratur.

 

Vi lagerfører et bredt udvalg af bøger, ikke bare inden for videnskab og teknik, men også f.eks. ledelse, IT og meget andet.

Læs mere her


Trykt eller digital bog?

Ud over trykte bøger tilbyder vi tre forskellige typer af digitale bøger:

 

Vital Source Bookshelf: En velfungerende ebogsplatform, hvor bogen downloades til din computer og/eller mobile enhed.

 

Du skal bruge den gratis Bookshelf software til at læse læse bøgerne - der er indbygget gode værktøjer til f.eks. søgning, overstregning, notetagning mv. I langt de fleste tilfælde vil du samtidig have en sideløbende 1825 dages online adgang. Læs mere om Vital Source bøger

 

Levering: I forbindelse med købet opretter du et login. Når du har installeret Bookshelf softwaren, logger du blot ind og din bog downloades automatisk.

 

 

Adobe ebog: Dette er Adobe DRM ebøger som downloades til din lokale computer eller mobil enhed.

 

For at læse bøgerne kræves særlig software, som understøtter denne type. Softwaren er gratis, men du bør sikre at du har rettigheder til installere software på den maskine du påtænker at anvende den på. Læs mere om Adobe DRM bøger

 

Levering: Et download link sendes pr email umiddelbart efter købet.

 


Ibog: Dette er en online bog som kan læses på udgiverens website. 

Der kræves ikke særlig software, bogen læses i en almindelig browser.

 

Levering: Vores medarbejder sender dig en adgangsnøgle pr email.

 

Vi gør opmærksom på at der ikke er retur/fortrydelsesret på digitale varer.