Cristian

17%
Flag icon
The possibilities were endless. An attacker could gain “unauthorized access to classified data by exploiting a pre-programmed weakness due to careless design or implementation” or plant “a ‘trap door’ in the computer application or in the programming and operating systems supporting the application.”
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Rate this book
Clear rating
Open Preview