The Myths of Security: What the Computer Security Industry Doesn’t Want You to Know

The Myths of Security: What the Computer Security Industry Doesn't Want You to KnowIf you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue.

Why is security so bad? With many more people online than just a few years ago, there are more attackers — and they’re truly motivated. Attacks are sophisticated, subtle, and harder to detect than ever. But, as Viega notes, few people take the time to understand the situation and protect themselves accordingly.

This book tells you:

  • Why it’s easier for bad guys to “own” your computer than you think
  • Why anti-virus software doesn’t work well — and one simple way to fix it
  • Whether Apple OS X is more secure than Windows
  • What Windows needs to do better
  • How to make strong authentication pervasive
  • Why patch management is so bad
  • Whether there’s anything you can do about identity theft
  • Five easy steps for fixing application security, and more

Provocative, insightful, and always controversial, The Myths of Security not only addresses IT professionals who deal with security issues, but also speaks to Mac and PC users who spend time online.

Price: $29.99

Click here to buy from Amazon

Perfect Password: Selection, Protection, Authentication

Rating: 
Amazon Price: N/A (as of May 27, 2017 19:49 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements.
Continue reading “Perfect Password: Selection, Protection, Authentication”

Analysis and Evaluation of Denial of Service attacks: on IEEE 802.11 Networks

Analysis and Evaluation of Denial of Service attacks: on IEEE 802.11 NetworksDespite their popularity and wider deployment, IEEE 802.11 WLANs have been found to be vulnerable to security threats soon after their emergence requiring adoption of security measures. However, the introduced security measures didn’t provide solutions for Denial of Service (DoS) attacks. This book characterizes the DoS attacks based on their ease of applicability and the degree of severity they introduce, and evaluates countermeasures for efficiency and effectiveness in defending against the attacks. Among various DoS attacks, Authentication Request Flooding (AuthRF) and Association Request Flooding (AssRF), which are practical and needing lesser effort to cause damage, were selected for study using OMNET++ simulation environment embedding INET Framework. Designs and models have been developed for the selected attacks and for two versions of defenses: countermeasure and enhanced countermeasures. The studied attacks, AuthRF and AssRF, required less effort and caused severe damage. Both versions of defenses, Countermeasure and Enhanced countermeasure, are effective although they incur delay.

Price: $60.00

Click here to buy from Amazon