It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_nuls

Record ID marc_nuls/NULS_PHC_180925.mrc:310204087:3260
Source marc_nuls
Download Link /show-records/marc_nuls/NULS_PHC_180925.mrc:310204087:3260?format=raw

LEADER: 03260cam 2200361 a 4500
001 9919654640001661
005 20150423121922.0
008 081117s2009 cc a b 001 0 eng
015 $aGBA8D6781$2bnb
016 7 $a014845185$2Uk
020 $a9780596523022 (hbk.)
020 $a0596523025 (hbk.)
035 $a(CSdNU)u371171-01national_inst
035 $a(OCoLC)263978539
035 $a(OCoLC)263978539
035 $a(OCoLC)263978539
040 $aUKM$cUKM$dBTCTA$dYDXCP$dNLGGC$dBWX$dCDX$dOEM$dC#P$dVP@$dOrLoB-B
049 $aCNUM
050 4 $aQA76.9.A25$bV54 2009
082 04 $a005.8$222
084 $a54.89$2bcl
100 1 $aViega, John.
245 14 $aThe myths of security :$bwhat the computer security industry doesn't want you to know /$cJohn Viega.
250 $a1st ed.
260 $aBeijing [China] ;$aCambridge :$bO'Reilly,$cc2009.
300 $axix, 238 p. :$bill. ;$c22 cm.
504 $aIncludes bibliographical references and index.
505 0 $aCh. 1. The security industry is broken -- Ch. 2. Security : nobody cares! -- Ch. 3. It's easier to get "owned" than you think -- Ch. 4. It's good to be bad -- Ch. 5. Test of a good security product : would I use it? -- Ch. 6. Why Microsoft's free AV won't matter -- Ch. 7. Google is evil -- Ch. 8. Why most AV doesn't work (well) -- Ch. 9. Why AV is often slow -- Ch. 10. Four minutes to infection? -- Ch. 11. Personal firewall problems -- Ch. 12. Call it "antivirus" -- Ch. 13. Why most people shouldn't run intrusion prevention systems -- Ch. 14. Problems with host intrusion prevention -- Ch. 15. Plenty of phish in the sea -- Ch. 16. The cult of Schneier -- Ch. 17. Helping others stay safe on the Internet -- Ch. 18. Snake oil : legitimate vendors sell it, too -- Ch. 19. Living in fear? -- Ch. 20. Is Apple really more secure? -- Ch. 21. OK, your mobile phone is insecure; should you care? -- Ch. 22. Do AV vendors write their own viruses? -- Ch. 23. One simple fix for the AV industry -- Ch. 24. Open source security : a red herring -- Ch. 25. Why SiteAdvisor was such a good idea -- Ch. 26. Is there anything we can do about identity theft? -- Ch. 27. Virtualization : host security's silver bullet? -- Ch. 28. When will we get rid of all the security vulnerabilities? -- Ch. 29. Application security on a budget -- Ch. 30. "Responsible disclosure" isn't responsible -- Ch. 31. Are man-in-the-middle attacks a myth? -- Ch. 32. An attack on PKI -- Ch. 33. HTTPS sucks : let's kill it! -- Ch. 34. CrAP-TCHA and the usability/security tradeoff -- Ch. 35. No death for the password -- Ch. 36. Spam is dead -- Ch. 37. Improving authentication -- Ch. 38. Cloud insecurity? -- Ch. 39. What AV companies should be doing (AV 2.0) -- Ch. 40. VPNs usually decrease security -- Ch. 41. Usability and security -- Ch. 42. Privacy -- Ch. 43. Anonymity -- Ch. 44. Improving patch management -- Ch. 45. An open security industry -- Ch. 46. Academics -- Ch. 47. Locksmithing -- Ch. 48. Critical infrastructure.
650 0 $aComputer security.
947 $fSOET-CIS$hCIRCSTACKS$p$28.49$q1
949 $aQA 76.9.A25 V54 2009$i31786102390603
994 $a92$bCNU
999 $aQA 76.9 .A25 V54 2009$wLC$c1$i31786102390603$d10/1/2013$e9/15/2013 $lCIRCSTACKS$mNULS$n1$q1$rY$sY$tBOOK$u10/23/2009