跳至内容
The myths of security : what the computer security industry doesn't want you to know 線上預覽
關閉線上預覽
正在查...

The myths of security : what the computer security industry doesn't want you to know

作者: John Viega
出版商: Beijing ; Cambridge ; Sebastopol, CA : O'Reilly, ©2009.
版本/格式:   圖書 : 英語 : 1st ed所有版本和格式的總覽
資料庫:WorldCat
提要:
If you think computer security has improved in recent years, Myths of Security will shake you out of your complacency. Longtime security professional John Viega reports on the sorry state of security, with concrete suggestions for professionals and individuals confronting the issue. Provocative, insightful, and often controversial, The Myths of Security addresses IT professionals who deal with security issues, and  再讀一些...
評定級別:

(尚未評分) 0 附有評論 - 成爲第一個。

主題
更多類似這樣的

 

在線上查詢

與資料的連結

在圖書館查詢

&AllPage.SpinnerRetrieving; 正在查詢有此資料的圖書館...

詳細書目

資料類型: 網際網路資源
文件類型: 圖書, 網路資源
所有的作者/貢獻者: John Viega
ISBN: 9780596523022 0596523025
OCLC系統控制編碼: 263978539
描述: xix, 238 p. : ill. ; 22 cm.
内容: The security industry is broken --
Security : nobody cares! --
It's easier to get "owned" than you think --
It's good to be bad --
Test of a good security product : would I use it? --
Why Microsoft's free AV won't matter --
Google is evil --
Why most AV doesn't work (well) --
Why AV is often slow --
Four minutes to infection? --
Personal firewall problems --
Call it "antivirus" --
Why most people shouldn't run intrusion prevention systems --
Problems with host intrusion prevention --
Plenty of phish in the sea --
The cult of Schneier --
Helping others stay safe on the Internet --
Snake oil : legitimate vendors sell it, too --
Living in fear? --
Is Apple really more secure? --
OK, your mobile phone is insecure; should you care? --
Do AV vendors write their own viruses? --
One simple fix for the AV industry --
Open source security : a red herring --
Why SiteAdvisor was such a good idea --
Is there anything we can do about identity theft? --
Virtualization : host security's silver bullet? --
When will we get rid of all the security vulnerabilities? --
Application security on a budget --
"Responsible disclosure" isn't responsible --
Are man-in-the-middle attacks a myth? --
An attack on PKI --
HTTPS sucks; let's kill it! --
CrAP-TCHA and the usability/security tradeoff --
No death for the password --
Spam is dead --
Improving authentication --
Cloud insecurity? --
What AV companies should be doing (AV 2.0) --
VPNs usually decrease security --
Usability and security --
Privacy --
Anonymity --
Improving patch management --
An open security industry --
Academics --
Locksmithing --
Critical infrastructure --
Epilogue.
責任: John Viega.

摘要:

Reports on the sorry state of the IT security industry and offers suggestions for professionals confronting the issue. This book tells you: why it's easier for bad guys to 'own' your computer than  再讀一些...

評論

讀者提供的評論
正在擷取GoodReads評論...
正在擷取DOGObooks的評論

標籤

所有的讀者標籤 (2)

檢視最熱門的標籤,呈現的形式是: 標籤我的最愛清單 | 標籤雲(tag cloud)

類似資料

相關主題:(5)

提供給讀者有關此資料的清單 (5)

確認申請

你可能已經申請過這份資料。若還是想申請,請選確認。

連結資料


<http://www.worldcat.org/oclc/263978539>
library:oclcnum"263978539"
library:placeOfPublication
library:placeOfPublication
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/263978539>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookEdition"1st ed."
schema:copyrightYear"2009"
schema:creator
schema:datePublished"2009"
schema:description"If you think computer security has improved in recent years, Myths of Security will shake you out of your complacency. Longtime security professional John Viega reports on the sorry state of security, with concrete suggestions for professionals and individuals confronting the issue. Provocative, insightful, and often controversial, The Myths of Security addresses IT professionals who deal with security issues, and speaks to Mac and PC users who spend time online."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/792487730>
schema:inLanguage"en"
schema:name"The myths of security : what the computer security industry doesn't want you to know"@en
schema:numberOfPages"238"
schema:publisher
schema:url
schema:workExample
umbel:isLike<http://bnb.data.bl.uk/id/resource/GBA8D6781>
umbel:isLike<http://bnb.data.bl.uk/id/resource/014-84518>
umbel:isLike<http://bnb.data.bl.uk/id/resource/GBA-8D678>

Content-negotiable representations

關閉視窗

請登入WorldCat 

没有帳號嗎?你可很容易的 建立免費的帳號.