upcarta
  • Sign In
  • Sign Up
  • Explore
  • Search

Computer security

52 Followers
Overview Content Creators Collections Asks
Recent Content Most Recommended
  • Article
  • Podcast episode
  • Tweet
  • Video
  • Book
  • Paper
  • Website
  • Blog
  • Course
  • Channel
  • Podcast
  • Series
  • Documentary
Book Apr 1, 2008
Security Engineering: A Guide to Building Dependable Distributed Systems
by Ross J. Anderson
Post Add to Collection Mark as Completed
Recommended by 8 people
8 mentions
Book Feb 28, 2021
Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems
by Heather Adkins
Post Add to Collection Mark as Completed
Recommended by 3 people
3 mentions
Tweet Mar 5, 2023
๐Ÿงต 1) Nostr is ๐Ÿ‘, but there are limitations and serious risks associated with using Nostr for your identity. Let's take a closer look at what the issues are, why it needs to be solved and why using Nostr for identity can increase the risk of security
by Level39
Post Add to Collection Mark as Completed
Recommended by 2 people
2 mentions
Series Sep 15, 2022
HACKING GOOGLE
by Google
Post Add to Collection Mark as Completed
Recommended by 2 people
2 mentions
Book Feb 9, 2021
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
by Nicole Perlroth
Post Add to Collection Mark as Completed
Recommended by 2 people
2 mentions
Book Jan 15, 2019
Habeas Data: Privacy vs. the Rise of Surveillance Tech
by Cyrus Farivar
Post Add to Collection Mark as Completed
Recommended by 2 people
2 mentions
Article Jun 7, 2023
Leaks and Breaches for OSINT
Post Add to Collection Mark as Completed
Recommended by 1 person
1 mention
Tweet Jun 6, 2023
30% is the average success rate of phishing attacks according to some reports! Do you know that you can be one of those victims at any time? Here's a list of tips to help you assess the legitimacy of an email: ๐Ÿ‘‡ twitter.com/hasan_3wada/status/1666
by Hasan Awada
Post Add to Collection Mark as Completed
Recommended by 1 person
1 mention
Tweet May 20, 2023
In programming, security is essential. Here are 8 simple but effective strategies for API development:
by Nikki Siapno
Post Add to Collection Mark as Completed
Recommended by 1 person
1 mention
Tweet May 14, 2023
3. Munger on Envy Envy is the worst negative-sum game. 1. The envious person is miserable 2. The envied person is under attack It's a virus of the mind that eats joy from everyone involved. twitter.com/george__mack/status/1657787521517117440/phot
by George Mack
Post Add to Collection Mark as Completed
Recommended by 1 person
1 mention
Tweet May 4, 2023
Last night, I fell in love with a cyber squatter. This dude did it all - some homework on me, some false urgency, some flattery. Seriously, I want to be in business with him. Screenshots follow. This dude has skills - I'm seriously impressed.
by Jon Matzner
Post Add to Collection Mark as Completed
Recommended by 1 person
1 mention
Article Apr 17, 2023
Revisiting CVE-2017-11176 | Bluefrostsecurity
by Nils Ole Timm
Post Add to Collection Mark as Completed
Recommended by 1 person
1 mention
Load More
  • upcarta ©2025
  • Home
  • About
  • Terms
  • Privacy
  • Cookies
  • @upcarta