biss boutiques-francophones Learn more vpcflyout Furniture All-New Kindle Paperwhite Own the 2016 GRAMMY Nominee Album featuring the Biggest Hits from Music's Biggest Night Exercice Tools ca_ty_gno
The Myths of Security and over one million other books are available for Amazon Kindle. Learn more

Vous voulez voir cette page en français ? Cliquez ici.


or
Sign in to turn on 1-Click ordering.
More Buying Choices
Have one to sell? Sell yours here
Start reading The Myths of Security on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

The Myths of Security: What the Computer Security Industry Doesn't Want You to Know [Paperback]

John Viega
4.5 out of 5 stars  See all reviews (2 customer reviews)
List Price: CDN$ 41.91
Price: CDN$ 29.16 & FREE Shipping. Details
You Save: CDN$ 12.75 (30%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 1 left in stock (more on the way).
Ships from and sold by Amazon.ca. Gift-wrap available.
‹  Return to Product Overview

Table of Contents

Foreword; Preface; Why Myths of Security?; Acknowledgments; How to Contact Us; Safari® Books Online; Chapter 1: The Security Industry Is Broken; Chapter 2: Security: Nobody Cares!; Chapter 3: It's Easier to Get "0wned" Than You Think; Chapter 4: It's Good to Be Bad; Chapter 5: Test of a Good Security Product: Would I Use It?; Chapter 6: Why Microsoft's Free AV Won't Matter; Chapter 7: Google Is Evil; Chapter 8: Why Most AV Doesn't Work (Well); Chapter 9: Why AV Is Often Slow; Chapter 10: Four Minutes to Infection?; Chapter 11: Personal Firewall Problems; Chapter 12: Call It "Antivirus"; Chapter 13: Why Most People Shouldn't Run Intrusion Prevention Systems; Chapter 14: Problems with Host Intrusion Prevention; Chapter 15: Plenty of Phish in the Sea; Chapter 16: The Cult of Schneier; Chapter 17: Helping Others Stay Safe on the Internet; Chapter 18: Snake Oil: Legitimate Vendors Sell It, Too; Chapter 19: Living in Fear?; Chapter 20: Is Apple Really More Secure?; Chapter 21: OK, Your Mobile Phone Is Insecure; Should You Care?; Chapter 22: Do AV Vendors Write Their Own Viruses?; Chapter 23: One Simple Fix for the AV Industry; Chapter 24: Open Source Security: A Red Herring; Chapter 25: Why SiteAdvisor Was Such a Good Idea; Chapter 26: Is There Anything We Can Do About Identity Theft?; Chapter 27: Virtualization: Host Security's Silver Bullet?; Chapter 28: When Will We Get Rid of All the Security Vulnerabilities?; Chapter 29: Application Security on a Budget; Chapter 30: "Responsible Disclosure" Isn't Responsible; Chapter 31: Are Man-in-the-Middle Attacks a Myth?; Chapter 32: An Attack on PKI; Chapter 33: HTTPS Sucks; Let's Kill It!; Chapter 34: CrAP-TCHA and the Usability/Security Tradeoff; Chapter 35: No Death for the Password; Chapter 36: Spam Is Dead; Chapter 37: Improving Authentication; Chapter 38: Cloud Insecurity?; Chapter 39: What AV Companies Should Be Doing (AV 2.0); Chapter 40: VPNs Usually Decrease Security; Chapter 41: Usability and Security; Chapter 42: Privacy; Chapter 43: Anonymity; Chapter 44: Improving Patch Management; Chapter 45: An Open Security Industry; Chapter 46: Academics; Chapter 47: Locksmithing; Chapter 48: Critical Infrastructure; Epilogue; Colophon;|Foreword Preface Chapter 1: The Security Industry Is Broken Chapter 2: Security: Nobody Cares! Chapter 3: It's Easier to Get "0wned" Than You Think Chapter 4: It's Good to Be Bad Chapter 5: Test of a Good Security Product: Would I Use It? Chapter 6: Why Microsoft's Free AV Won't Matter Chapter 7: Google Is Evil Chapter 8: Why Most AV Doesn't Work (Well) Chapter 9: Why AV Is Often Slow Chapter 10: Four Minutes to Infection? Chapter 11: Personal Firewall Problems Chapter 12: Call It "Antivirus" Chapter 13: Why Most People Shouldn't Run Intrusion Prevention Systems Chapter 14: Problems with Host Intrusion Prevention Chapter 15: Plenty of Phish in the Sea Chapter 16: The Cult of Schneier Chapter 17: Helping Others Stay Safe on the Internet Chapter 18: Snake Oil: Legitimate Vendors Sell It, Too Chapter 19: Living in Fear? Chapter 20: Is Apple Really More Secure? Chapter 21: OK, Your Mobile Phone Is Insecure; Should You Care? Chapter 22: Do AV Vendors Write Their Own Viruses? Chapter 23: One Simple Fix for the AV Industry Chapter 24: Open Source Security: A Red Herring Chapter 25: Why SiteAdvisor Was Such a Good Idea Chapter 26: Is There Anything We Can Do About Identity Theft? Chapter 27: Virtualization: Host Security's Silver Bullet? Chapter 28: When Will We Get Rid of All the Security Vulnerabilities? Chapter 29: Application Security on a Budget Chapter 30: "Responsible Disclosure" Isn't Responsible Chapter 31: Are Man-in-the-Middle Attacks a Myth? Chapter 32: An Attack on PKI Chapter 33: HTTPS Sucks; Let's Kill It! Chapter 34: CrAP-TCHA and the Usability/Security Tradeoff Chapter 35: No Death for the Password Chapter 36: Spam Is Dead Chapter 37: Improving Authentication Chapter 38: Cloud Insecurity? Chapter 39: What AV Companies Should Be Doing (AV 2.0) Chapter 40: VPNs Usually Decrease Security Chapter 41: Usability and Security Chapter 42: Privacy Chapter 43: Anonymity Chapter 44: Improving Patch Management Chapter 45: An Open Security Industry Chapter 46: Academics Chapter 47: Locksmithing Chapter 48: Critical Infrastructure Epilogue Colophon

‹  Return to Product Overview