The Myths of Security and over one million other books are available for Amazon Kindle. Learn more

Vous voulez voir cette page en français ? Cliquez ici.

Sign in to turn on 1-Click ordering.
More Buying Choices
Have one to sell? Sell yours here
Start reading The Myths of Security on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

The Myths of Security: What the Computer Security Industry Doesn't Want You to Know [Paperback]

John Viega
4.5 out of 5 stars  See all reviews (2 customer reviews)
List Price: CDN$ 37.99
Price: CDN$ 18.80 & FREE Shipping on orders over CDN$ 25. Details
You Save: CDN$ 19.19 (51%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Usually ships within 3 to 6 weeks.
Ships from and sold by Gift-wrap available.
‹  Return to Product Overview

Table of Contents

  • Foreword
  • Preface
  • Chapter 1: The Security Industry Is Broken
  • Chapter 2: Security: Nobody Cares!
  • Chapter 3: It's Easier to Get "0wned" Than You Think
  • Chapter 4: It's Good to Be Bad
  • Chapter 5: Test of a Good Security Product: Would I Use It?
  • Chapter 6: Why Microsoft's Free AV Won't Matter
  • Chapter 7: Google Is Evil
  • Chapter 8: Why Most AV Doesn't Work (Well)
  • Chapter 9: Why AV Is Often Slow
  • Chapter 10: Four Minutes to Infection?
  • Chapter 11: Personal Firewall Problems
  • Chapter 12: Call It "Antivirus"
  • Chapter 13: Why Most People Shouldn't Run Intrusion Prevention Systems
  • Chapter 14: Problems with Host Intrusion Prevention
  • Chapter 15: Plenty of Phish in the Sea
  • Chapter 16: The Cult of Schneier
  • Chapter 17: Helping Others Stay Safe on the Internet
  • Chapter 18: Snake Oil: Legitimate Vendors Sell It, Too
  • Chapter 19: Living in Fear?
  • Chapter 20: Is Apple Really More Secure?
  • Chapter 21: OK, Your Mobile Phone Is Insecure; Should You Care?
  • Chapter 22: Do AV Vendors Write Their Own Viruses?
  • Chapter 23: One Simple Fix for the AV Industry
  • Chapter 24: Open Source Security: A Red Herring
  • Chapter 25: Why SiteAdvisor Was Such a Good Idea
  • Chapter 26: Is There Anything We Can Do About Identity Theft?
  • Chapter 27: Virtualization: Host Security's Silver Bullet?
  • Chapter 28: When Will We Get Rid of All the Security Vulnerabilities?
  • Chapter 29: Application Security on a Budget
  • Chapter 30: "Responsible Disclosure" Isn't Responsible
  • Chapter 31: Are Man-in-the-Middle Attacks a Myth?
  • Chapter 32: An Attack on PKI
  • Chapter 33: HTTPS Sucks; Let's Kill It!
  • Chapter 34: CrAP-TCHA and the Usability/Security Tradeoff
  • Chapter 35: No Death for the Password
  • Chapter 36: Spam Is Dead
  • Chapter 37: Improving Authentication
  • Chapter 38: Cloud Insecurity?
  • Chapter 39: What AV Companies Should Be Doing (AV 2.0)
  • Chapter 40: VPNs Usually Decrease Security
  • Chapter 41: Usability and Security
  • Chapter 42: Privacy
  • Chapter 43: Anonymity
  • Chapter 44: Improving Patch Management
  • Chapter 45: An Open Security Industry
  • Chapter 46: Academics
  • Chapter 47: Locksmithing
  • Chapter 48: Critical Infrastructure
  • Epilogue
  • Colophon

‹  Return to Product Overview