000 03921cam a2200469 i 4500
999 _c200436324
_d54536
003 TR-AnTOB
005 20200217102747.0
007 ta
008 081117t20092009cc a b 001 0 eng
010 _a2010286045
015 _aGBA8D6781
_2bnb
015 _a014-84518
_2bnb
015 _aGBA-8D678
_2bnb
015 _aGBA8D6781
_2dnb
020 _a9780596523022 (pbk.)
020 _a0596523025 (pbk.)
035 _a(OCoLC)263978539
035 _a(TR-AnTOB)
040 _aUKM
_beng
_erda
_cUKM
_dBTCTA
_dYDXCP
_dNLGGC
_dBWX
_dCDX
_dOEM
_dC#P
_dVP@
_dGBVCP
_dZAD
_dDEBBG
_dOCL
_dNSB
_dDLC
_dOCLCQ
_dOBE
_dCS1
_dMNW
_dFIN
_dTR-AnTOB
041 0 _aeng
050 0 0 _aQA76.9.A25
_bV55 2009
090 _aQA76.9.A25
_bV55 2009
100 1 _aViega, John
_eauthor
_0http://id.loc.gov/authorities/names/n2001005797
_921484
245 1 4 _aThe myths of security :
_bwhat the computer security industry doesn't want you to know /
_cJohn Viega.
250 _aFirst edition.
264 1 _aBeijing ;
_aCambridge ;
_aSebastopol, CA :
_bO'Reilly,
_c[2009]
264 4 _c©2009
300 _axix, 238 pages :
_billustrations ;
_c22 cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 0 0 _tThe security industry is broken --
_tSecurity : nobody cares! --
_tIt's easier to get "owned" than you think --
_tIt's good to be bad --
_tTest of a good security product : would I use it? --
_tWhy Microsoft's free AV won't matter --
_tGoogle is evil --
_tWhy most AV doesn't work (well) --
_tWhy AV is often slow --
_tFour minutes to infection? --
_tPersonal firewall problems --
_tCall it "antivirus" --
_tWhy most people shouldn't run intrusion prevention systems --
_tProblems with host intrusion prevention --
_tPlenty of phish in the sea --
_tThe cult of Schneier --
_tHelping others stay safe on the Internet --
_tSnake oil : legitimate vendors sell it, too --
_tLiving in fear? --
_tIs Apple really more secure? --
_tOK, your mobile phone is insecure; should you care? --
_tDo AV vendors write their own viruses? --
_tOne simple fix for the AV industry --
_tOpen source security : a red herring --
_tWhy SiteAdvisor was such a good idea --
_tIs there anything we can do about identity theft? --
_tVirtualization : host security's silver bullet? --
_tWhen will we get rid of all the security vulnerabilities? --
_tApplication security on a budget --
_t"Responsible disclosure" isn't responsible --
_tAre man-in-the-middle attacks a myth? --
_tAn attack on PKI --
_tHTTPS sucks : let's kill it! --
_tCrAP-TCHA and the usability/security tradeoff --
_tNo death for the password --
_tSpam is dead --
_tImproving authentication --
_tCloud insecurity? --
_tWhat AV companies should be doing (AV 2.0) --
_tVPNs usually decrease security --
_tUsability and security --
_tPrivacy --
_tAnonymity --
_tImproving patch management --
_tAn open security industry --
_tAcademics --
_tLocksmithing --
_tCritical infrastructure.
520 _aIf you think computer security has improved in recent years, Myths of Security will shake you out of your complacency. Longtime security professional John Viega reports on the sorry state of security, with concrete suggestions for professionals and individuals confronting the issue. Provocative, insightful, and often controversial, The Myths of Security addresses IT professionals who deal with security issues, and speaks to Mac and PC users who spend time online.
590 _aDonated by Kemal Bıçakçı
650 7 _aData protection
_0http://id.loc.gov/authorities/subjects/sh85035859
_91313
650 7 _aComputer security
_0http://id.loc.gov/authorities/subjects/sh90001862
_9912
650 0 _aInternet industry
_xSecurity measures
_0http://id.loc.gov/authorities/subjects/sh96010223
_0http://id.loc.gov/authorities/subjects/sh99005297
_9125637
942 _2lcc
_cBK