Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

Buy
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is security so bad? With many more people online than just a few years ago, there are more attackers -- and they're truly motivated. Attacks are sophisticated, subtle, and harder to detect than ever. But, as Viega notes, few people take the time to understand the situation and protect themselves accordingly. This book tells you:

Why it's easier for bad guys to "own" your computer than you think Why anti-virus software doesn't work well -- and one simple way to fix it Whether Apple OS X is more secure than Windows What Windows needs to do better How to make strong authentication pervasive Why patch management is so bad Whether there's anything you can do about identity theft Five easy steps for fixing application security, and more

Provocative, insightful, and always controversial, The Myths of Security not only addresses IT professionals who deal with security issues, but also speaks to Mac and PC users who spend time online.

About the Author

John Viega is CTO of the SaaS Business Unit at McAfee, his second stint at McAfee. Previously, he was their Chief Security Architect, after which he founded and served as CEO of Stonewall Software, which focused on making anti-virus technology faster, better and cheaper. John was also the founder of Secure Software (now part of Fortify).

John is author of many security books, including Building Secure Software (Addison-Wesley), Network Security with OpenSSL (O'Reilly), and the forthcoming Myths of Security (O'Reilly). He is responsible for numerous software security tools and is the original author of Mailman, the GNU mailing list manager. He has done extensive standards work in the IEEE and IETF and co-invented GCM, a cryptographic algorithm that NIST has standardized. John is also an active advisor to several security companies, including Fortify and Bit9. He holds a MS and BA from the University of Virginia.

(HTML tags aren't allowed.)

Expert C# 2008 Business Objects
Expert C# 2008 Business Objects
Do you want to create .NET applications that provide high performance and scalability? Do you want to employ object–oriented programming techniques in a distributed environment? Do you want to maximize the reuse and maintainability of your code? Then this book is for you.

In Rockford Lhotka’s Expert C# 2008...

Common-Sense C: Advice and Warnings for C and C++ Programmers
Common-Sense C: Advice and Warnings for C and C++ Programmers
C is a powerful programming language, but not without risks. Without help, even experienced C programmers can find themselves in trouble, despite "careful" programming, lint filters and good debuggers. And managers of programming projects can discover too late that using C carelessly can lead to delayed and defect-ridden software. This...
CVD Diamond for Electronic Devices and Sensors
CVD Diamond for Electronic Devices and Sensors
Synthetic diamond is diamond produced by using chemical or physical processes. Like naturally occurring diamond it is composed of a three-dimensional carbon crystal. Due to its extreme physical properties, synthetic diamond is used in many industrial applications, such as drill bits and scratch-proof coatings, and has the potential to be used in...

JUMP! : Skydiving Made Fun & Easy
JUMP! : Skydiving Made Fun & Easy
Skydiving can be the thrill of a lifetime, but is “taking the plunge” right for you? Before you invest your hard earned dollars in pricey equipment and expensive lessons, read this book and find out. You’ll get an expert, frank overview of the sport covering everything you need to know BEFORE you go ahead and enroll in a skydiving...
Embodied Conceptualization or Neural Realization: A Corpus-Driven Study of Mandarin Synaesthetic Adjectives (Frontiers in Chinese Linguistics)
Embodied Conceptualization or Neural Realization: A Corpus-Driven Study of Mandarin Synaesthetic Adjectives (Frontiers in Chinese Linguistics)
This book focuses on linguistic synaesthesia in a hitherto less-studied language – Mandarin Chinese – and adopts a corpus-driven approach to support the analysis and argumentation. The study identifies directional tendencies and underlying mechanisms for Mandarin synaesthetic adjectives. By doing so, it not only provides an...
Pro .NET 2.0 XML (Expert's Voice in .Net)
Pro .NET 2.0 XML (Expert's Voice in .Net)
XML is the de facto language for communication within and between distributed applications, whether they're on the Internet or a corporate network. XML is successful because of two strengths: it has a highly-structured human readable format and it can be transmitted as pure text. No matter how disparate applications and their architectures may be,...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy