|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn436233047 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
090910s2009 caua ob 001 0 eng |
040 |
|
|
|a CTN
|b eng
|e pn
|c CTN
|d CUS
|d UMI
|d EBLCP
|d OCLCQ
|d CEF
|d YDXCP
|d OCLCQ
|d DEBSZ
|d TXM
|d OCLCQ
|d UMC
|d OCLCF
|d OCLCQ
|d E7B
|d OCLCQ
|d OCLCA
|d UAB
|d UKAHL
|d OCLCQ
|d YDX
|d OCLCO
|d OCLCA
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 599824342
|a 609841471
|a 861533726
|
020 |
|
|
|a 9780596555832
|q (electronic bk.)
|
020 |
|
|
|a 0596555830
|q (electronic bk.)
|
020 |
|
|
|a 9780596803957
|
020 |
|
|
|a 0596803958
|
020 |
|
|
|z 0596803958
|
020 |
|
|
|z 9780596523022
|q (hbk.)
|
020 |
|
|
|z 0596523025
|q (hbk.)
|
029 |
1 |
|
|a AU@
|b 000046330753
|
029 |
1 |
|
|a AU@
|b 000061533406
|
029 |
1 |
|
|a AU@
|b 000067097744
|
029 |
1 |
|
|a DEBSZ
|b 35542312X
|
029 |
1 |
|
|a DEBSZ
|b 396275508
|
029 |
1 |
|
|a HEBIS
|b 291494757
|
029 |
1 |
|
|a NZ1
|b 13685866
|
035 |
|
|
|a (OCoLC)436233047
|z (OCoLC)599824342
|z (OCoLC)609841471
|z (OCoLC)861533726
|
037 |
|
|
|a CL0500000062
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b V54 2009eb
|
082 |
0 |
4 |
|a 005.8
|
084 |
|
|
|a 54.89
|2 bcl
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Viega, John.
|
245 |
1 |
4 |
|a The myths of security :
|b what the computer security industry doesn't want you to know /
|c John Viega.
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a Sebastopol, Calif. :
|b O'Reilly Media,
|c ©2009.
|
300 |
|
|
|a 1 online resource :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a The security industry is broken --; Security : nobody cares! --; It's easier to get "owned" than you think --; It's good to be bad --; Test of a good security product : would I use it? --; Why Microsoft's free AV won't matter --; Google is evil --; Why most AV doesn't work (well) --; Why AV is often slow --; Four minutes to infection? --; Personal firewall problems --; Call it "antivirus" --; Why most people shouldn't run intrusion prevention systems --; Problems with host intrusion prevention --; Plenty of phish in the sea --; The cult of Schneier --; Helping others stay safe on the Internet --; Snake oil : legitimate vendors sell it, too --; Living in fear? --; Is Apple really more secure? --; OK, your mobile phone is insecure; should you care? --; Do AV vendors write their own viruses? --; One simple fix for the AV industry --; Open source security : a red herring --; Why SiteAdvisor was such a good idea --; Is there anything we can do about identity theft? --; Virtualization : host security's silver bullet? --; When will we get rid of all the security vulnerabilities? --; Application security on a budget --; "Responsible disclosure" isn't responsible --; Are man-in-the-middle attacks a myth? --; An attack on PKI --; HTTPS sucks : let's kill it! --; CrAP-TCHA and the usability/security tradeoff --; No death for the password --; Spam is dead --; Improving authentication --; Cloud insecurity? --; What AV companies should be doing (AV 2.0) --; VPNs usually decrease security --; Usability and security --; Privacy --; Anonymity --; Improving patch management --; An open security industry --; Academics --; Locksmithing --; Critical infrastructure.
|
520 |
|
|
|a If you think computer security has improved in recent years, Myths of Security will shake you out of your complacency. Longtime security professional John Viega reports on the sorry state of security, with concrete suggestions for professionals and individuals confronting the issue. Provocative, insightful, and often controversial, The Myths of Security addresses IT professionals who deal with security issues, and speaks to Mac and PC users who spend time online.
|
588 |
0 |
|
|a HTML title (Safari Books Online, viewed September 10, 2009).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security.
|2 blmlsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Computersicherheit
|2 gnd
|
776 |
0 |
8 |
|i Print version:
|a Viega, John.
|t Myths of security.
|b 1st ed.
|d Beijing [China] ; Cambridge : O'Reilly, ©2009
|z 9780596523022
|w (OCoLC)263978539
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780596803957/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26837879
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL443506
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7365649
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3317216
|
994 |
|
|
|a 92
|b IZTAP
|