Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Geekonomics: The Real Cost of Insecure Software

Buy
You may or may not have an inkling of what insecure software is, how it impacts your life, or why you should be concerned. That is OK. This book attempts to introduce you to the full scope and consequence of software's impact on modern society without baffling the reader with jargon only experts understand or minutia only experts care about. The prerequisite for this book is merely a hint of curiosity.

Although we interact with software on a daily basis, carry it on our mobile phones, drive with it in our cars, fly with it in our planes, and use it in our home and business computers, software itself remains essentially shrouded—a ghost in the machine; a mystery that functions but only part of the time. And therein lays our problem.

Software is the stuff of modern infrastructure. Not only is software infused into a growing number of commercial products we purchase and services we use, but government increasingly uses software to manage the details of our lives, to allocate benefits and public services we enjoy as citizens, and to administer and defend the state as a whole. How and when we touch software and how and when it touches us is less our choice every day. The quality of this software matters greatly; the level of protection this software affords us from harm and exploitation matters even more.

As a case in point, in mid-2007 the country of Estonia, dubbed "the most wired nation in Europe" because of its pervasive use of computer networks for a wide array of private and public activities, had a significant portion of its national infrastructure crippled for over two weeks by cyber attacks launched from hundreds of thousands of individual computers that had been previously hijacked by Russian hackers. Estonia was so overwhelmed by the attacks Estonian leaders literally severed the country's connection to the Internet and with it the country's economic and communications lifeline to the rest of the world. As one Estonian official lamented, "We are back to the stone age." The reason for the cyber attack? The Russian government objected to Estonia's removal of a Soviet-era war memorial from the center of its capital Tallinn to a military cemetery.

(HTML tags aren't allowed.)

Expressive Processing: Digital Fictions, Computer Games, and Software Studies
Expressive Processing: Digital Fictions, Computer Games, and Software Studies

What matters in understanding digital media? Is looking at the external appearance and audience experience of software enough--or should we look further? In Expressive Processing, Noah Wardrip-Fruin argues that understanding what goes on beneath the surface, the computational processes that make digital media function, is...

iPad in Education For Dummies
iPad in Education For Dummies

It's easy to bring the incredible iPad experience to your classroom today!

The iPad is a natural fit for education in the 21st century, and this straightforward, full-color guide shows you just how to deploy it effectively in your educational institution. From understanding how iPads can be used for different learning...

The Vehicle Routing Problem: Latest Advances and New Challenges (Operations Research/Computer Science Interfaces Series)
The Vehicle Routing Problem: Latest Advances and New Challenges (Operations Research/Computer Science Interfaces Series)
The Vehicle Routing Problem (VRP) has been an especially active and fertile area of research. Over the past five to seven years, there have been numerous technological advances and exciting challenges that are of considerable interest to students, teachers, and researchers. The Vehicle Routing Problem: Latest Advances and New...

Definitive Guide to Excel VBA, Second Edition
Definitive Guide to Excel VBA, Second Edition

Microsoft's Excel is not only a powerful spreadsheet and graphics tool—it contains a programming language called Visual Basic for Applications (VBA), which allows you to automate simple tasks and enables you to create full-featured applications that make Excel users even more productive. In the Definitive Guide to Excel VBA, Second...

An Introduction to Tensor Calculus, Relativity and Cosmology
An Introduction to Tensor Calculus, Relativity and Cosmology
This elementary introduction pays special attention to aspects of tensor calculus and relativity that students tend to find most difficult. Its use of relatively unsophisticated mathematics in the early chapters allows readers to develop their confidence within the framework of Cartesian coordinates before undertaking the theory of tensors in...
Data Mining in Bioinformatics (Advanced Information and Knowledge Processing)
Data Mining in Bioinformatics (Advanced Information and Knowledge Processing)
The aim of this book is to introduce the reader to some of the best techniques for data mining in bioinformatics in the hope that the reader will build on them to make new discoveries on his or her own. The book contains twelve chapters in four parts, namely, overview, sequence and structure alignment, biological...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy