Further reading
This chapter covered some topics but less than the previous chapters. If you want to go deeper, we’re happy to share some valuable resources with you:
- [1] Csikszentmihalyi, M. (2004). Flow, the secret to happiness. [online] www.ted.com. Available at https://www.ted.com/talks/mihaly_csikszentmihalyi_flow_the_secret_to_happiness?language=en.
- [2] Schneier, B. (2007). Essays: Schneier: Full Disclosure of Security Vulnerabilities a ‘Damned Good Idea’ - Schneier on Security. [online] www.schneier.com. Available at https://www.schneier.com/essays/archives/2007/01/schneier_full_disclo.html.
- [3] National Vulnerability Database (2021). NVD - CVE-2021-44228. [online] nvd.nist.gov. Available at https://nvd.nist.gov/vuln/detail/CVE-2021-44228.
- [4] Kiska, C. (2021). https://twitter.com/TheGamblingBird/status/1470518451198439426. [online] Twitter. Available at https://twitter.com/TheGamblingBird/status/1470518451198439426.
- [5] Wetter, J...