The Myths of Security PDF ePub eBook

Books Info:

The Myths of Security free pdf If you think computer security has improved in recent years, "The Myths of Security" will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is security so bad? With many more people online than just a few years ago, there are more attackers - and they're truly motivated. Attacks are sophisticated, subtle, and harder to detect than ever. But, as Viega notes, few people take the time to understand the situation and protect themselves accordingly. This book tells you: why it's easier for bad guys to 'own' your computer than you think- why anti-virus software doesn't work well - and one simple way to fix it- whether Apple OS X is more secure than Windows- what Windows needs to do better- how to make strong authentication pervasive- why patch management is so bad- whether there's anything you can do about identity theft- five easy steps for fixing application security, and more. Provocative, insightful, and always controversial, "The Myths of Security" not only addresses IT professionals who deal with security issues, but also speaks to Mac and PC users who spend time online.

About John Viega

John Viega is CTO of the SaaS Business Unit at McAfee, his second stint at McAfee. Previously, he was their Chief Security Architect, after which he founded and served as CEO of Stonewall Software, which focused on making anti-virus technology faster, better and cheaper. John was also the founder of Secure Software (now part of Fortify). John is author of many security books, including Building Secure Software (Addison-Wesley), Network Security with OpenSSL (O'Reilly), and the forthcoming Myths of Security (O'Reilly). He is responsible for numerous software security tools and is the original author of Mailman, the GNU mailing list manager. He has done extensive standards work in the IEEE and IETF and co-invented GCM, a cryptographic algorithm that NIST has standardized. John is also an active advisor to several security companies, including Fortify and Bit9. He holds a MS and BA from the University of Virginia.

Details Book

Author : John Viega
Publisher : O'Reilly Media, Inc, USA
Data Published : 07 July 2009
ISBN : 0596523025
EAN : 9780596523022
Format Book : PDF, Epub, DOCx, TXT
Number of Pages : 238 pages
Age + : 15 years
Language : English
Rating :

Reviews The Myths of Security



17 Comments Add a comment




Related eBooks Download


  • Official (ISC)2R Guide to the ISSMPR CBKR free pdfOfficial (ISC)2R Guide to the ISSMPR CBKR

    As the recognized leader in the field of information security education and certification. the (ISC)2AR promotes the development of information security professionals around the world. The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMPAR) examination assesses individuals' understanding of security management practices..


  • Official (ISC)2R Guide to the ISSMPR CBKR free pdfOfficial (ISC)2R Guide to the ISSMPR CBKR

    As the recognized leader in the field of information security education and certification. the (ISC)2AR promotes the development of information security professionals around the world. The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMPAR) examination assesses individuals' understanding of security management practices..


  • The Practice of Network Security Monitoring free pdfThe Practice of Network Security Monitoring

    Network security is not simply about building impenetrable walls - determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions..


  • Global Environmental Change and Human Security free pdfGlobal Environmental Change and Human Security

    In recent years. scholars in international relations and other fields have begun to conceive of security more broadly. moving away from a state-centered concept of national security toward the idea of human security..


  • Computer Security Literacy free pdfComputer Security Literacy

    Traditional computer security books typically focus on the implementation or theory of security controls and mechanisms at the application. operating system..


  • The Myths of Security free pdfThe Myths of Security

    . If you think computer security has improved in recent years, "The Myths of Security" will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Archit