Skip to content

Myths of Security What the Computer Security Industry Doesn't Want You to Know

Best in textbook rentals since 2012!

ISBN-10: 0596523025

ISBN-13: 9780596523022

Edition: 2009

Authors: John Viega

List price: $29.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Customers also bought

Book details

List price: $29.99
Copyright year: 2009
Publisher: O'Reilly Media, Incorporated
Publication date: 7/14/2009
Binding: Paperback
Pages: 264
Size: 5.50" wide x 8.50" long x 0.70" tall
Weight: 0.572
Language: English

Foreword
Preface
The Security Industry Is Broken
Security: Nobody Cares!
It's Easier to Get "Owned" Than You Think
It's Good to Be Bad
Test of a Good Security Product: Would I Use It?
Why Microsoft's Free AV Won't Matter
Google Is Evil
Why Most AV Doesn't Work (Well)
Why AV Is Often Slow
Four Minutes to Infection?
Personal Firewall Problems
Call It "Antivirus"
Why Most People Shouldn't Run Intrusion Prevention Systems
Problems with Host Intrusion Prevention
Plenty of Phish in the Sea
The Cult of Schneier
Helping Others Stay Safe on the Internet
Snake Oil: Legitimate Vendors Sell It, Too
Living in Fear?
Is Apple Really More Secure?
Ok, Your Mobile Phone Is Insecure; Should You Care?
Do AV Vendors Write Their Own Viruses?
One Simple Fix for the AV Industry
Open Source Security: A Red Herring
Why SiteAdvisor Was Such a Good Idea
Is There Anything We Can Do About Identity Theft?
Virtualization: Host Security's Silver Bullet?
When Will We Get Rid of All the Security Vulnerabilities?
Application Security on a Budget
"Responsible Disclosure" Isn't Responsible
Are Man-in-the-Middle Attacks a Myth?
An Attack on PKI
HTTPS Sucks; Let's Kill It!
CrAP-TCHA and the Usability/Security Tradeoff
No Death for the Password
Spam Is Dead
Improving Authentication
Cloud Insecurity?
What AV Companies Should Be Doing (AV 2.0)
VPNs Usually Decrease Security
Usability and Security
Privacy
Anonymity
Improving Patch Management
An Open Security Industry
Academics
Locksmithing
Critical Infrastructure
Epilogue
Index