Source: https://habr.com/ru/post/35225/More articles:Security Week 10: where to hide the miner and a brief excursion into darknet marketingDEFCON 24: “How to take the best seats in the security theater, or hack boarding passes for fun and profit""Without Meltdown and Specter": Intel redesigns its processorsDiscrediting specialists or modern interviewsNeural networks, genetic algorithms, etc. ... Myths and reality. SignsAlan Kay and Marvin Minsky: Computer Science already has a “grammar”. Need "literature"Application of the OWASP Mobile TOP 10 methodology for testing Android applicationsLinux fornsica in the face of tracking USB device connection historyMarvin Minsky "The Emotion Machine": Chapter 2 "How our brain can control itself, despite its complexity"Implement targeted marketing on the siteAll Articles