| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910784273303321 |
|
|
Autore |
Bradley Tony |
|
|
Titolo |
Essential computer security [[electronic resource] ] : everyone's guide to e-mail, internet, and wireless security / / Tony Bradley, Harlan Carvey |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Rockland, MA, : Syngress Publishing, c2006 |
|
|
|
|
|
|
|
ISBN |
|
1-281-07186-2 |
9786611071868 |
0-08-050589-9 |
1-59749-159-4 |
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (321 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Computers - Access control - Passwords |
Electronic mail systems - Security measures |
Firewalls (Computer security) |
Internet - Security measures |
Spam filtering (Electronic mail) |
Spyware (Computer software) |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; Essential Computer Security; Copyright Page; Contents; Foreword; Introduction; Part I: Bare Essentials; Chapter 1. Basic Windows Security; Introduction; Why Do You Need to Be Secure?; Why Are You at Risk?; Summary; Additional Resources; Chapter 2. Passwords; Introduction; Password Power; Password Cracking; Storing Your Passwords; One Super-Powerful Password; Summary; Additional Resources; Chapter 3. Viruses, Worms, and Other Malware; Introduction; Malware Terms; The History of Malware; Chapter 4. Patching; Introduction; Patch Terminology; Why Should I Patch? |
How Do I Know What to Patch?Summary; Additional Resources; Summary; Additional Resources; Part II: More Essential Security; Chapter 5. Perimeter Security; Introduction; From Moats and Bridges to Firewalls and Filters; Firewalls; Intrusion Detection and Prevention; Summary; Additional Resources; Chapter 6. E-mail Safety; Introduction; |
|
|
|
|
|
|
|
|
|
|
|
The Evolution of E-mail; E-mail Security Concerns; Summary; Additional Resources; Chapter 7. Web Surfing Privacy and Safety; Introduction; The Revolutionary World Wide Web; Web Security Concerns; Summary; Additional Resources; Chapter 8. Wireless Network Security |
IntroductionThe Basics of Wireless Networks; Basic Wireless Network Security Measures; Additional Hotspot Security Measures; Summary; Additional Resources; Chapter 9. Spyware and Adware; Introduction; What Is Adware?; What Is Spyware?; Getting Rid of Spyware; Summary; Additional Resources; Part III: Testing and Maintenance; Chapter 10. Keeping Things Secure; Introduction; General PC Maintenance; Patches and Updates; Windows XP Security Center; Summary; Additional Resources; Chapter 11. When Disaster Strikes; Introduction; Check the Event Logs; Enable Security Auditing |
Review Your Firewall LogsScan Your Computer; Restore Your System; Start from Scratch; Restore Your Data; Call In the Pros; Summary; Additional Resources; Chapter 12. Microsoft Alternatives: Inside the Linux Desktop . .; Introduction; Common Desktop Environments; The X Window System and Window Managers; E-mail and Personal Information Management Clients; Sylpheed; Essential Information; E-mail and PIM Software; Migrating Mail; Web Browsers; Office Application Suites; Running Windows Applications on Linux; Summary; Additional Resources; Part IV: Security Resources . |
Appendix A. Essential Network CommunicationsIntroduction; Computer Protocols; Communication Ports; TCP and UDP Protocols; Understanding IP Addresses and DNS; Managing IP Addresses; Firewalls; Appendix B. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix C. Glossary of Technology and Terminology; Index |
|
|
|
|
|
|
Sommario/riassunto |
|
Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Securit |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910811570203321 |
|
|
Autore |
Firchow Peter Edgerly <1937-> |
|
|
Titolo |
Envisioning Africa : racism and imperialism in Conrad's Heart of darkness / / Peter Edgerly Firchow |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Lexington, Kentucky : , : The University Press of Kentucky, , 2000 |
|
©2000 |
|
|
|
|
|
|
|
|
|
ISBN |
|
0-8131-9198-X |
0-8131-4975-4 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (291 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Political fiction, English - History and criticism |
English literature - African influences |
Imperialism in literature |
Racism in literature |
Race in literature |
Africa In literature |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Title; Copyright; Contents; Preface; Introduction: Race, Ethnicity, Nationality, Empire; 1. Envisioning Africa; 2. A Mere Animal in the Congo; 3. Envisioning Kurtz; 4. Imperial Sham and Reality in the Congo; 5. Unspeakable Rites and Speakable Rights; 6. E.J. Glave, Captain Rom, and the Making of Heart of Darkness; Conclusion: Exterminating All the Brutes; Appendix; Notes; Works Cited; Index; |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
For one hundred years, Heart of Darkness has been among the most widely read and taught novels in the English language. Hailed as an incisive indictment of European imperialism in Africa upon its publication in 1899, more recently it has been repeatedly denounced as racist and imperialist. Peter Firchow counters these claims, and his carefully argued response allows the charges of Conrad's alleged bias to be evaluated as objectively as possible. He begins by contrasting the meanings of race, racism, and imperialism in Conrad's day to those of our own time. Firchow then argues that Heart of D |
|
|
|
|
|
|
|
| |