|
|
|
|
LEADER |
02709nam a2200217 a 4500 |
001 |
556305 |
005 |
20171111230020.0 |
008 |
100122s2009 caua b 001 0 eng d |
020 |
|
|
|a 9780596523022 (hbk.)
|
040 |
|
|
|a UKM
|
050 |
1 |
4 |
|a QA76.9.A25
|b V54 2009
|
082 |
1 |
4 |
|2 22
|a 005.8
|
100 |
1 |
4 |
|a Viega, John
|
245 |
1 |
4 |
|a The myths of security :
|b what the computer security industry doesn't want you to know /
|c John Viega.
|
250 |
1 |
4 |
|a 1st ed.
|
260 |
1 |
4 |
|a Sebastopol, CA :
|b O'Reilly,
|c c2009.
|
300 |
1 |
4 |
|a xix, 238 p. :
|b ill. ;
|c 22 cm.
|
504 |
1 |
4 |
|a Includes bibliographical references and index.
|
505 |
1 |
4 |
|a Ch. 1. security industry is broken -- Ch. 2. Security : nobody cares! -- Ch. 3. It's easier to get "owned" than you think -- Ch. 4. It's good to be bad -- Ch. 5. Test of a good security product : would I use it? -- Ch. 6. Why Microsoft's free AV won't matter -- Ch. 7. Google is evil -- Ch. 8. Why most AV doesn't work (well) -- Ch. 9. Why AV is often slow -- Ch. 10. Four minutes to infection? -- Ch. 11. Personal firewall problems -- Ch. 12. Call it "antivirus" -- Ch. 13. Why most people shouldn't run intrusion prevention systems -- Ch. 14. Problems with host intrusion prevention -- Ch. 15. Plenty of phish in the sea -- Ch. 16. cult of Schneier -- Ch. 17. Helping others stay safe on the Internet -- Ch. 18. Snake oil : legitimate vendors sell it, too -- Ch. 19. Living in fear? -- Ch. 20. Is Apple really more secure? -- Ch. 21. OK, your mobile phone is insecure; should you care? -- Ch. 22. Do AV vendors write their own viruses? -- Ch. 23. One simple fix for the AV industry -- Ch. 24. Open source security : a red herring -- Ch. 25. Why SiteAdvisor was such a good idea -- Ch. 26. Is there anything we can do about identity theft? -- Ch. 27. Virtualization : host security's silver bullet? -- Ch. 28. When will we get rid of all the security vulnerabilities? -- Ch. 29. Application security on a budget -- Ch. 30. "Responsible disclosure" isn't responsible -- Ch. 31. Are man-in-the-middle attacks a myth? -- Ch. 32. attack on PKI -- Ch. 33. HTTPS sucks : let's kill it! -- Ch. 34. CrAP-TCHA and the usability/security tradeoff -- Ch. 35. No death for the password -- Ch. 36. Spam is dead -- Ch. 37. Improving authentication -- Ch. 38. Cloud insecurity? -- Ch. 39. What AV companies should be doing (AV 2.0) -- Ch. 40. VPNs usually decrease security -- Ch. 41. Usability and security -- Ch. 42. Privacy -- Ch. 43. Anonymity -- Ch. 44. Improving patch management -- Ch. 45. open security industry -- Ch. 46. Academics -- Ch. 47. Locksmithing -- Ch. 48. Critical infrastructure.
|
650 |
1 |
4 |
|a Computer security
|
952 |
|
|
|a GrThPMO
|b 59b018d16c5ad17d7e5ae51e
|c 952a
|d 9528
|e QA76.9.A25V54 2009
|t 7
|x m
|z Books
|