The Myths of Security and over one million other books are available for Amazon Kindle. En apprendre davantage

Vous voulez voir cette page en français ? Cliquez ici.

Sign in to turn on 1-Click ordering.
More Buying Choices
Have one to sell? Sell yours here
Start reading The Myths of Security on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

The Myths of Security: What the Computer Security Industry Doesn't Want You to Know [Paperback]

John Viega
4.5 out of 5 stars  See all reviews (2 customer reviews)
List Price: CDN$ 37.99
Price: CDN$ 18.80 & FREE Shipping on orders over CDN$ 25. Details
You Save: CDN$ 19.19 (51%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Usually ships within 2 to 4 weeks.
Ships from and sold by Gift-wrap available.
‹  Return to Product Overview

Table of Contents

Foreword Preface Chapter 1: The Security Industry Is Broken Chapter 2: Security: Nobody Cares! Chapter 3: It's Easier to Get "0wned" Than You Think Chapter 4: It's Good to Be Bad Chapter 5: Test of a Good Security Product: Would I Use It? Chapter 6: Why Microsoft's Free AV Won't Matter Chapter 7: Google Is Evil Chapter 8: Why Most AV Doesn't Work (Well) Chapter 9: Why AV Is Often Slow Chapter 10: Four Minutes to Infection? Chapter 11: Personal Firewall Problems Chapter 12: Call It "Antivirus" Chapter 13: Why Most People Shouldn't Run Intrusion Prevention Systems Chapter 14: Problems with Host Intrusion Prevention Chapter 15: Plenty of Phish in the Sea Chapter 16: The Cult of Schneier Chapter 17: Helping Others Stay Safe on the Internet Chapter 18: Snake Oil: Legitimate Vendors Sell It, Too Chapter 19: Living in Fear? Chapter 20: Is Apple Really More Secure? Chapter 21: OK, Your Mobile Phone Is Insecure; Should You Care? Chapter 22: Do AV Vendors Write Their Own Viruses? Chapter 23: One Simple Fix for the AV Industry Chapter 24: Open Source Security: A Red Herring Chapter 25: Why SiteAdvisor Was Such a Good Idea Chapter 26: Is There Anything We Can Do About Identity Theft? Chapter 27: Virtualization: Host Security's Silver Bullet? Chapter 28: When Will We Get Rid of All the Security Vulnerabilities? Chapter 29: Application Security on a Budget Chapter 30: "Responsible Disclosure" Isn't Responsible Chapter 31: Are Man-in-the-Middle Attacks a Myth? Chapter 32: An Attack on PKI Chapter 33: HTTPS Sucks; Let's Kill It! Chapter 34: CrAP-TCHA and the Usability/Security Tradeoff Chapter 35: No Death for the Password Chapter 36: Spam Is Dead Chapter 37: Improving Authentication Chapter 38: Cloud Insecurity? Chapter 39: What AV Companies Should Be Doing (AV 2.0) Chapter 40: VPNs Usually Decrease Security Chapter 41: Usability and Security Chapter 42: Privacy Chapter 43: Anonymity Chapter 44: Improving Patch Management Chapter 45: An Open Security Industry Chapter 46: Academics Chapter 47: Locksmithing Chapter 48: Critical Infrastructure Epilogue Colophon

‹  Return to Product Overview