Blaine Morrow

36%
Flag icon
the most sophisticated attackers want the source code, the hieroglyphics created and admired by the engineering class. Source code is the raw matter for software and hardware. It is what tells your devices and apps how to behave, when to turn on, when to sleep, who to let in, who to keep out. Source code manipulation is the long game. Code can be stolen and manipulated today and, like an invisible hole in the wall of the Oval Office, bear fruit immediately or years into the future.
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Rate this book
Clear rating
Open Preview