Онлайн
библиотека книг
Книги онлайн » Разная литература » Законы эпидемий. Как развиваются и почему прекращаются эпидемии болезней, финансовые кризисы, вспышки насилия и модные тренды - Адам Кучарски

Шрифт:

-
+

Закладка:

Сделать
1 ... 88 89 90 91 92 93 94 95 96 97
Перейти на страницу:
DDoS Attack’, Kaspersky Lab, 23 March 2017.

492

Palmer D., ‘Ransomware is now big business on the dark web and malware developers are cashing in’, ZDNet, 11 October 2017.

493

Nakashima E. and Timberg C., ‘NSA officials worried about the day its potent hacking tool would get loose. Then it did’, Washington Post, 16 May 2017.

494

Orr A., ‘Zerodium Offers $2 Million for Remote iOS Exploits’, Mac Observer, 10 January 2019.

495

Kushner D., ‘The Real Story of Stuxnet’, IEEE Spectrum, 26 February 2013; Kopfstein J., ‘Stuxnet virus was planted by Israeli agents using USB sticks, according to new report’, The Verge, 12 April 2012.

496

Kaplan F., Dark Territory: The Secret History of Cyber War (Simon & Schuster, 2016).

497

Dark Trace. Global Threat Report 2017. http://www.darktrace.com.

498

Lomas A., ‘Screwdriving. Locating and exploiting smart adult toys’, Pen Test Partners Blog, 29 September 2017; Franceschi-Bicchierai L., ‘Hackers Can Easily Hijack This Dildo Camera and Livestream the Inside of Your Vagina (Or Butt)’, Motherboard, 3 April 2017.

499

DeMarinis N. et al., ‘Scanning the Internet for ROS: A View of Security in Robotics Research’, arXiv, 2018.

500

Об отключении серверов AWS: Hindi R., ‘Thanks for breaking our connected homes, Amazon’, Medium, 28 February, 2017; Hern A., ‘How did an Amazon glitch leave people literally in the dark?’, The Guardian, 1 March 2017.

501

Amazon Compute Service Level Agreement, https://aws.amazon.com, 12 February 2018; Poletti T., ‘The engine for Amazon earnings growth has nothing to do with e-commerce’, Market Watch, 29 April 2018.

502

Swift D., ‘“Mega Outage” Wreaks Havoc on Internet, is AWS too Big to Fail?’, Digit, 2017; Bobeldijk Y., ‘Is Amazon’s cloud service too big to fail?’, Financial News, 1 August 2017.

503

Barrett B. and Newman L.H., ‘The Facebook Security Meltdown Exposes Way More Sites Than Facebook’, Wired, 28 September 2018.

504

О «любовном вирусе»: Meek J., ‘Love bug virus creates worldwide chaos’, The Guardian, 5 May 2000; Barabási A.L., Linked: the New Science of Networks (Perseus Books, 2003).

505

White S.R., ‘Open Problems in Computer Virus Research’, Virus Bulletin Conference, 1998.

506

Barabási A.L. and Albert R., ‘Emergence of Scaling in Random Networks’, Science, 1999.

507

Pastor-Satorras R. and Vespignani A., ‘Epidemic Spreading in ScaleFree Networks’, Physical Review Letters, 2 April 2001.

508

Goel S. et al., ‘The Structural Virality of Online Diffusion’, Management Science, 2016.

509

О программном модуле left-pad: Williams C., ‘How one developer just broke Node, Babel and thousands of projects in 11 lines of JavaScript’, The Register, 23 March 2016; Tung L., ‘A row that led a developer to delete a 17-line JavaScript module has stopped countless applications working’, ZDNet, 23 March 2016; Roberts M., ‘A discussion about the breaking of the Internet’, Medium, 23 March 2016.

510

Haney D., ‘NPM & left-pad: Have We Forgotten How To Program?’, 23 March 2016, https://www.davidhaney.io.

511

Rotabi R. et al., ‘Tracing the Use of Practices through Networks of Collaboration’, AAAI, 2017.

512

Fox-Brewster T., ‘Hackers Sell $7,500 IoT Cannon To Bring Down The Web Again’, Forbes, 23 October 2016.

513

Gallagher S., ‘New variants of Mirai botnet detected, targeting more IoT devices’, Ars Technica, 9 April 2019.

514

Cohen F., ‘Computer Viruses – Theory and Experiments’, 1984.

515

Cloonan J., ‘Advanced Malware Detection – Signatures vs. Behavior Analysis’, Infosecurity Magazine, 11 April 2017.

516

Oldstone M.B.A., Viruses, Plagues, and History (Oxford University Press, 2010).

517

Goodin D., ‘US, European police take down highly elusive botnet known as Beebone’, Ars Technica, 9 April 2015; Samani R., ‘Update on the Beebone Botnet Takedown’, McAfee Blogs, 20 April 2015.

518

Thompson C.P. et al., ‘A naturally protective epitope of limited variability as an influenza vaccine target’, Nature Communications, 2018.

519

‘McAfee Labs 2019 Threats Predictions Report’, McAfee Labs, 29 November 2018; Seymour J. and Tully P., ‘Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter’, Working paper, 2016.

520

Дело Шмидта: Court of Appeal of Louisiana, Third Circuit. STATE of Louisiana v. Richard J. SCHMIDT. No. 99–1412, 2000; Miller M., ‘A Deadly Attraction’, Newsweek, 18 August 1996.

521

Darwin C., Journal of researches into the natural history and geology of the countries visited during the voyage of H.M.S. Beagle round the world, under the command of Capt. Fitz Roy, R.N. (John Murray, 1860).

522

Другая аналогия – игра «дублеты», придуманная Льюисом Кэрроллом. В ней путем постепенной замены букв можно получить из одного слова другое, например: КОЗА – ПОЗА – ПОЛА – ПОЛК – ВОЛК. – Прим. ред.

523

Hon C.C. et al., ‘Evidence of the Recombinant Origin of a Bat Severe Acute Respiratory Syndrome (SARS)-Like Coronavirus and Its Implications on the Direct Ancestor of SARS Coronavirus’, Journal of Virology, 2008.

524

Forensic File Update on Janice Trahan Case, CNN, 14 March 2016.

525

González-Candelas F. et al., ‘Molecular evolution

1 ... 88 89 90 91 92 93 94 95 96 97
Перейти на страницу: