The myths of security what the computer security industry doesn’t want you to know 1st Edition by John Viega – Ebook PDF Instant Download/Delivery: 0596523025, 9780596523022
Full download The myths of security what the computer security industry doesn’t want you to know 1st Edition after payment

Product details:
ISBN 10: 0596523025
ISBN 13: 9780596523022
Author: John Viega
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue.
Why is security so bad? With many more people online than just a few years ago, there are more attackers — and they’re truly motivated. Attacks are sophisticated, subtle, and harder to detect than ever. But, as Viega notes, few people take the time to understand the situation and protect themselves accordingly. This book tells you:
- Why it’s easier for bad guys to “own” your computer than you think
- Why anti-virus software doesn’t work well — and one simple way to fix it
- Whether Apple OS X is more secure than Windows
- What Windows needs to do better
- How to make strong authentication pervasive
- Why patch management is so bad
- Whether there’s anything you can do about identity theft
- Five easy steps for fixing application security, and more
Provocative, insightful, and always controversial, The Myths of Security not only addresses IT professionals who deal with security issues, but also speaks to Mac and PC users who spend time online.
Table of contents:
1: The Security Industry Is Broken
2: Security: Nobody Cares!
3: It’s Easier to Get “Owned” Than You Think
4: It’s Good to Be Bad
5: Test of a Good Security Product: Would I Use It?
6: Why Microsoft’s Free AV Won’t Matter
7: Google Is Evil
8: Why Most AV Doesn’t Work (Well)
9: Why AV Is Often Slow
10: Four Minutes to Infection?
11: Personal Firewall Problems
12: Call It “Antivirus”
13: Why Most People Shouldn’t Run Intrusion Prevention Systems
14: Problems with Host Intrusion Prevention
15: Plenty of Phish in the Sea
16: The Cult of Schneier
17: Helping Others Stay Safe on the Internet
18: Snake Oil: Legitimate Vendors Sell It, Too
19: Living in Fear?
20: Is Apple Really More Secure?
21: OK, Your Mobile Phone Is Insecure: Should You Care?
22: Do AV Vendors Write Their Own Viruses?
23: One Simple Fix for the AV Industry
24: Open Source Security: A Red Herring
25: Why SiteAdvisor Was Such a Good Idea
26: Is There Anything We Can Do About Identity Theft?
27: Virtualization: Host Security’s Silver Bullet?
28: When Will We Get Rid of All the Security Vulnerabilities?
29: Application Security on a Budget
30: “Responsible Disclosure” Isn’t Responsible
31: Are Man-in-the-Middle Attacks a Myth?
32: An Attack on PKI
33: HTTPS Sucks; Let’s Kill It!
34: CrAP-TCHA and the Usability/Security Tradeoff
35: No Death for the Password
36: Spam Is Dead
37: Improving Authentication
38: Cloud Insecurity?
39: What AV Companies Should Be Doing (AV 2.0)
40: VPNs Usually Decrease Security
41: Usability and Security
42: Privacy
43: Anonymity
44: Improving Patch Management
45: An Open Security Industry
46: Academics
47: Locksmithing
48: Critical Infrastructure
People also search for:
security myths
5 computer security myths to stop believing and why
10 computer security myths
cyber security myths
the myth of secure computing
Tags: John Viega, Myths of Security, Computer Security, Industry


