Category:Book:End-user Computer Security/Book part/Appendix/Parts/«New security inventions requiring a non-trivial investment in new technology», part 1