Books & Videos

Table of Contents

  1. Chapter 1 The Security Industry Is Broken

  2. Chapter 2 Security: Nobody Cares!

  3. Chapter 3 It's Easier to Get "0wned" Than You Think

  4. Chapter 4 It's Good to Be Bad

  5. Chapter 5 Test of a Good Security Product: Would I Use It?

  6. Chapter 6 Why Microsoft's Free AV Won't Matter

  7. Chapter 7 Google Is Evil

  8. Chapter 8 Why Most AV Doesn't Work (Well)

  9. Chapter 9 Why AV Is Often Slow

  10. Chapter 10 Four Minutes to Infection?

  11. Chapter 11 Personal Firewall Problems

  12. Chapter 12 Call It "Antivirus"

  13. Chapter 13 Why Most People Shouldn't Run Intrusion Prevention Systems

  14. Chapter 14 Problems with Host Intrusion Prevention

  15. Chapter 15 Plenty of Phish in the Sea

  16. Chapter 16 The Cult of Schneier

  17. Chapter 17 Helping Others Stay Safe on the Internet

  18. Chapter 18 Snake Oil: Legitimate Vendors Sell It, Too

  19. Chapter 19 Living in Fear?

  20. Chapter 20 Is Apple Really More Secure?

  21. Chapter 21 OK, Your Mobile Phone Is Insecure; Should You Care?

  22. Chapter 22 Do AV Vendors Write Their Own Viruses?

  23. Chapter 23 One Simple Fix for the AV Industry

  24. Chapter 24 Open Source Security: A Red Herring

  25. Chapter 25 Why SiteAdvisor Was Such a Good Idea

  26. Chapter 26 Is There Anything We Can Do About Identity Theft?

  27. Chapter 27 Virtualization: Host Security's Silver Bullet?

  28. Chapter 28 When Will We Get Rid of All the Security Vulnerabilities?

  29. Chapter 29 Application Security on a Budget

  30. Chapter 30 "Responsible Disclosure" Isn't Responsible

  31. Chapter 31 Are Man-in-the-Middle Attacks a Myth?

  32. Chapter 32 An Attack on PKI

  33. Chapter 33 HTTPS Sucks; Let's Kill It!

  34. Chapter 34 CrAP-TCHA and the Usability/Security Tradeoff

  35. Chapter 35 No Death for the Password

  36. Chapter 36 Spam Is Dead

  37. Chapter 37 Improving Authentication

  38. Chapter 38 Cloud Insecurity?

  39. Chapter 39 What AV Companies Should Be Doing (AV 2.0)

  40. Chapter 40 VPNs Usually Decrease Security

  41. Chapter 41 Usability and Security

  42. Chapter 42 Privacy

  43. Chapter 43 Anonymity

  44. Chapter 44 Improving Patch Management

  45. Chapter 45 An Open Security Industry

  46. Chapter 46 Academics

  47. Chapter 47 Locksmithing

  48. Chapter 48 Critical Infrastructure

  1. Appendix Epilogue

  2. Colophon