Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

Buy
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is security so bad? With many more people online than just a few years ago, there are more attackers -- and they're truly motivated. Attacks are sophisticated, subtle, and harder to detect than ever. But, as Viega notes, few people take the time to understand the situation and protect themselves accordingly. This book tells you:

Why it's easier for bad guys to "own" your computer than you think Why anti-virus software doesn't work well -- and one simple way to fix it Whether Apple OS X is more secure than Windows What Windows needs to do better How to make strong authentication pervasive Why patch management is so bad Whether there's anything you can do about identity theft Five easy steps for fixing application security, and more

Provocative, insightful, and always controversial, The Myths of Security not only addresses IT professionals who deal with security issues, but also speaks to Mac and PC users who spend time online.

About the Author

John Viega is CTO of the SaaS Business Unit at McAfee, his second stint at McAfee. Previously, he was their Chief Security Architect, after which he founded and served as CEO of Stonewall Software, which focused on making anti-virus technology faster, better and cheaper. John was also the founder of Secure Software (now part of Fortify).

John is author of many security books, including Building Secure Software (Addison-Wesley), Network Security with OpenSSL (O'Reilly), and the forthcoming Myths of Security (O'Reilly). He is responsible for numerous software security tools and is the original author of Mailman, the GNU mailing list manager. He has done extensive standards work in the IEEE and IETF and co-invented GCM, a cryptographic algorithm that NIST has standardized. John is also an active advisor to several security companies, including Fortify and Bit9. He holds a MS and BA from the University of Virginia.

(HTML tags aren't allowed.)

Computer Fraud Casebook: The Bytes that Bite
Computer Fraud Casebook: The Bytes that Bite
In 1995, computer fraud took down England's oldest bank. In 1996, Omega Engineering Company lost over $10 million to one disgruntled employee's computer fraud. In 2001, two Cisco Systems employees stole $8 million in computer stock option refunds through computer fraud. And technology experts and professional crime fighters predict that computer...
Lovell and Winter's Pediatric Orthopaedics (2 Volume Set)
Lovell and Winter's Pediatric Orthopaedics (2 Volume Set)

Now in its updated Sixth Edition, this classic text remains a must-have for physicians and residents treating infants, children, or adolescents with orthopaedic problems. The foremost orthopaedists examine normal musculoskeletal development and the causes, diagnosis, and treatment of the entire range of abnormalities, with emphasis...

Neuromarketing: Understanding the Buy Buttons in Your Customer's Brain
Neuromarketing: Understanding the Buy Buttons in Your Customer's Brain

Unveiling a remarkable combination of the latest brain research and revolutionary marketing practices, authors Patrick Renvoise and Christophe Morin teach highly effective techniques to build and deliver powerful, unique, and memorable messages that will have major, lasting impact on any audience.

...

Introduction to Java Programming-Comprehensive Version (6th Edition)
Introduction to Java Programming-Comprehensive Version (6th Edition)

Now integrating Java 5 throughout, this reference introduces Java programming fundamentals – including problem-solving, object-oriented programming, GUI programming, data structures, networking, internationalization, advanced GUI programming, and Web programming. Includes many new...

Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists
Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists

Feature engineering is a crucial step in the machine-learning pipeline, yet this topic is rarely examined on its own. With this practical book, you’ll learn techniques for extracting and transforming features—the numeric representations of raw data—into formats for machine-learning models. Each chapter guides you...

Longman Student Grammar of Spoken and Written English Workbook (Grammar Reference)
Longman Student Grammar of Spoken and Written English Workbook (Grammar Reference)

* invaluable for students on university and teacher-training courses* checks your knowledge of how English is actually used in speech and writing* shows how grammar differs in different contexts of registers* provides practice with relationships between grammar and vocabulary* all examples taken from naturally occurring English texts and...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy