The Myths of Security. What the Computer Security Industry Doesn't Want You to Know - Helion
ISBN: 978-05-965-5583-2
stron: 264, Format: ebook
Data wydania: 2009-06-16
Księgarnia: Helion
Cena książki: 84,92 zł (poprzednio: 98,74 zł)
Oszczędzasz: 14% (-13,82 zł)
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue.
Why is security so bad? With many more people online than just a few years ago, there are more attackers -- and they're truly motivated. Attacks are sophisticated, subtle, and harder to detect than ever. But, as Viega notes, few people take the time to understand the situation and protect themselves accordingly. This book tells you:
- Why it's easier for bad guys to "own" your computer than you think
- Why anti-virus software doesn't work well -- and one simple way to fix it
- Whether Apple OS X is more secure than Windows
- What Windows needs to do better
- How to make strong authentication pervasive
- Why patch management is so bad
- Whether there's anything you can do about identity theft
- Five easy steps for fixing application security, and more
Provocative, insightful, and always controversial, The Myths of Security not only addresses IT professionals who deal with security issues, but also speaks to Mac and PC users who spend time online.
Osoby które kupowały "The Myths of Security. What the Computer Security Industry Doesn't Want You to Know", wybierały także:
- PHP 7.3. Kurs video. Tworzenie bezpiecznej strony typu e-commerce 119,00 zł, (47,60 zł -60%)
- Spring Security. Kurs video. Skuteczne metody zabezpieczeń aplikacji 69,00 zł, (27,60 zł -60%)
- Spring Security. Kurs video. Metody zabezpieczania aplikacji webowych 69,00 zł, (31,05 zł -55%)
- Chmura Azure. Praktyczne wprowadzenie dla administratora. Implementacja, monitorowanie i zarządzanie ważnymi usługami i komponentami IaaS/PaaS 79,00 zł, (39,50 zł -50%)
- Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 2 99,00 zł, (49,50 zł -50%)
Spis treści
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know eBook -- spis treści
- The Myths of Security
- SPECIAL OFFER: Upgrade this ebook with OReilly
- Foreword
- Preface
- Why Myths of Security?
- Acknowledgments
- How to Contact Us
- Safari Books Online
- 1. The Security Industry Is Broken
- 2. Security: Nobody Cares!
- 3. Its Easier to Get "0wned" Than You Think
- 4. It's Good to Be Bad
- 5. Test of a Good Security Product: Would I Use It?
- 6. Why Microsoft's Free AV Won't Matter
- 7. Google Is Evil
- 8. Why Most AV Doesn't Work (Well)
- 9. Why AV Is Often Slow
- 10. Four Minutes to Infection?
- 11. Personal Firewall Problems
- 12. Call It "Antivirus"
- 13. Why Most People Shouldn't Run Intrusion Prevention Systems
- 14. Problems with Host Intrusion Prevention
- 15. Plenty of Phish in the Sea
- 16. The Cult of Schneier
- 17. Helping Others Stay Safe on the Internet
- 18. Snake Oil: Legitimate Vendors Sell It, Too
- 19. Living in Fear?
- 20. Is Apple Really More Secure?
- 21. OK, Your Mobile Phone Is Insecure; Should You Care?
- 22. Do AV Vendors Write Their Own Viruses?
- 23. One Simple Fix for the AV Industry
- 24. Open Source Security: A Red Herring
- 25. Why SiteAdvisor Was Such a Good Idea
- 26. Is There Anything We Can Do About Identity Theft?
- 27. Virtualization: Host Security's Silver Bullet?
- 28. When Will We Get Rid of All the Security Vulnerabilities?
- 29. Application Security on a Budget
- 30. "Responsible Disclosure" Isn't Responsible
- 31. Are Man-in-the-Middle Attacks a Myth?
- 32. An Attack on PKI
- 33. HTTPS Sucks; Let's Kill It!
- 34. CrAP-TCHA and the Usability/Security Tradeoff
- 35. No Death for the Password
- 36. Spam Is Dead
- 37. Improving Authentication
- 38. Cloud Insecurity?
- 39. What AV Companies Should Be Doing (AV 2.0)
- 40. VPNs Usually Decrease Security
- 41. Usability and Security
- 42. Privacy
- 43. Anonymity
- 44. Improving Patch Management
- 45. An Open Security Industry
- 46. Academics
- 47. Locksmithing
- 48. Critical Infrastructure
- A. Epilogue
- Index
- About the Author
- Colophon
- SPECIAL OFFER: Upgrade this ebook with OReilly