Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
8 results found. Sorted by relevance | date | title .
Results Page:  Previous Next
Author Hypponen, Mikko, author.

Title If it's smart, it's vulnerable / Mikko Hypponen. [O'Reilly electronic resource]

Publication Info. Hoboken, New Jersery : Wiley, 2022.
QR Code
Description 1 online resource (xxii, 262 pages)
Note Includes index.
Summary "All our devices and gadgets--from our refrigerators to our home security systems, vacuum cleaners, and stereos--are going online, just like our computers did. But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? In If It's Smart, It's Vulnerable, veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best--and worst--things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing. In this book, the author explores the transformative potential of the future of the internet, as well as those things that threaten its continued existence: government surveillance, censorship, organized crime, and more"-- Amazon.
Contents Foreword / Jeff Moss -- Preface -- Saab 9000 Turbo -- The good and bad of the internet. Prehistoric internet ; The first websites ; Linux is the world's most important system ; iPhone vs. supercomputer ; Online communities ; Money is data ; Codes all around us ; Geopolitics ; Security Tetris ; Who are we fighting? ; The Rolex -- Malware: then, now, and in the near future. The history of malware ; Smartphones and malware ; Law enforcement malware ; Ransomware Trojans -- The human element. The two problems ; The heist ; CEO fraud ; Protecting company networks ; Bug bounties ; Wi-fi terms of use ; Mikko's tips ; Mikko's tips for the startup entrepreneur ; Boat for sale -- What if the network goes down?. Electrical networks ; Security factories ; Hypponen's law ; Dumb devices ; Regulation ; Car software updates -- Online privacy. Life without Google ; Murder charges never expire ; Is Google listening to you? ; Gorillas ; Startup business logic ; Biometrics ; Antisocial media ; Online influencing and elections ; Privacy is dead ; Before and after Gmail ; Encryption techniques ; Data is the new uranium ; CASE Vastaamo -- Cryptocurrencies. The value of money ; Blockchains ; The environmental impacts of Bitcoin ; Playing the market ; Ethereum, Monero, and Zcash ; NFT ; Bitcoin and crime ; Border guards vs. Bitcoin -- Technology, espionage, and warfare online. Cyberweapons ; Technology and warfare ; Under a false flag ; Concealability of cyberweapons ; The fog of cyberwar ; Case Prykarpattyaoblenergo ; Case Pyeongchang ; Governments as malware authors ; Russia and China ; Case Stuxnet ; Damage coverage ; Explosion at the White House ; My boycott of RSA, Inc. -- The future. Artificial intelligence ; Wolverines ; AI will take our jobs ; Smart malware ; Metaverse ; The technology of warfare ; "You are under arrest for a future murder" ; Those who can adapt will prosper ; Tesla ; Trends in technology.
Subject Computer security.
Internet of things -- Security measures.
Sécurité informatique.
Internet des objets -- Sécurité -- Mesures.
Computer security
Other Form: Print version: 1119895189 9781119895183 (OCoLC)1290376044
ISBN 9781119895190 (electronic book)
1119895197 (electronic book)
9781119895206 (electronic book)
1119895200 (electronic book)
(hardback)
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information