The myths of security : what the computer security industry doesn't want you to know /

Main Author: Viega, John
Format: Book
Language:English
Published: Sebastopol, CA : O'Reilly, c2009.
Edition:1st ed.
Subjects:
LEADER 02709nam a2200217 a 4500
001 556305
005 20171111230020.0
008 100122s2009 caua b 001 0 eng d
020 |a 9780596523022 (hbk.) 
040 |a UKM 
050 1 4 |a QA76.9.A25  |b V54 2009 
082 1 4 |2 22  |a 005.8 
100 1 4 |a Viega, John 
245 1 4 |a The myths of security :  |b what the computer security industry doesn't want you to know /  |c John Viega. 
250 1 4 |a 1st ed. 
260 1 4 |a Sebastopol, CA :  |b O'Reilly,  |c c2009. 
300 1 4 |a xix, 238 p. :  |b ill. ;  |c 22 cm. 
504 1 4 |a Includes bibliographical references and index. 
505 1 4 |a Ch. 1. security industry is broken -- Ch. 2. Security : nobody cares! -- Ch. 3. It's easier to get "owned" than you think -- Ch. 4. It's good to be bad -- Ch. 5. Test of a good security product : would I use it? -- Ch. 6. Why Microsoft's free AV won't matter -- Ch. 7. Google is evil -- Ch. 8. Why most AV doesn't work (well) -- Ch. 9. Why AV is often slow -- Ch. 10. Four minutes to infection? -- Ch. 11. Personal firewall problems -- Ch. 12. Call it "antivirus" -- Ch. 13. Why most people shouldn't run intrusion prevention systems -- Ch. 14. Problems with host intrusion prevention -- Ch. 15. Plenty of phish in the sea -- Ch. 16. cult of Schneier -- Ch. 17. Helping others stay safe on the Internet -- Ch. 18. Snake oil : legitimate vendors sell it, too -- Ch. 19. Living in fear? -- Ch. 20. Is Apple really more secure? -- Ch. 21. OK, your mobile phone is insecure; should you care? -- Ch. 22. Do AV vendors write their own viruses? -- Ch. 23. One simple fix for the AV industry -- Ch. 24. Open source security : a red herring -- Ch. 25. Why SiteAdvisor was such a good idea -- Ch. 26. Is there anything we can do about identity theft? -- Ch. 27. Virtualization : host security's silver bullet? -- Ch. 28. When will we get rid of all the security vulnerabilities? -- Ch. 29. Application security on a budget -- Ch. 30. "Responsible disclosure" isn't responsible -- Ch. 31. Are man-in-the-middle attacks a myth? -- Ch. 32. attack on PKI -- Ch. 33. HTTPS sucks : let's kill it! -- Ch. 34. CrAP-TCHA and the usability/security tradeoff -- Ch. 35. No death for the password -- Ch. 36. Spam is dead -- Ch. 37. Improving authentication -- Ch. 38. Cloud insecurity? -- Ch. 39. What AV companies should be doing (AV 2.0) -- Ch. 40. VPNs usually decrease security -- Ch. 41. Usability and security -- Ch. 42. Privacy -- Ch. 43. Anonymity -- Ch. 44. Improving patch management -- Ch. 45. open security industry -- Ch. 46. Academics -- Ch. 47. Locksmithing -- Ch. 48. Critical infrastructure. 
650 1 4 |a Computer security 
952 |a GrThPMO  |b 59b018d16c5ad17d7e5ae51e  |c 952a  |d 9528  |e QA76.9.A25V54 2009  |t 7  |x m  |z Books