05958nam 2200853Ia 450 991082495550332120200520144314.01-281-07186-297866110718680-08-050589-91-59749-159-4(CKB)1000000000339641(EBL)319200(OCoLC)476115205(SSID)ssj0000149304(PQKBManifestationID)11150959(PQKBTitleCode)TC0000149304(PQKBWorkID)10237659(PQKB)11572140(Au-PeEL)EBL319200(CaPaEBR)ebr10150167(CaONFJC)MIL107186(OCoLC)437191988(Au-PeEL)EBL275384(OCoLC)77012578(CaSebORM)9781597491143(MiAaPQ)EBC319200(MiAaPQ)EBC275384(OCoLC)1029627070(OCoLC)on1029627070(EXLCZ)99100000000033964120061114d2006 uy 0engur|n|---|||||txtccrEssential computer security everyone's guide to e-mail, internet, and wireless security /Tony Bradley, Harlan Carvey1st editionRockland, MA Syngress Publishingc20061 online resource (321 p.)Includes index.1-59749-114-4 Includes bibliographical references and index.Front Cover; Essential Computer Security; Copyright Page; Contents; Foreword; Introduction; Part I: Bare Essentials; Chapter 1. Basic Windows Security; Introduction; Why Do You Need to Be Secure?; Why Are You at Risk?; Summary; Additional Resources; Chapter 2. Passwords; Introduction; Password Power; Password Cracking; Storing Your Passwords; One Super-Powerful Password; Summary; Additional Resources; Chapter 3. Viruses, Worms, and Other Malware; Introduction; Malware Terms; The History of Malware; Chapter 4. Patching; Introduction; Patch Terminology; Why Should I Patch?How Do I Know What to Patch?Summary; Additional Resources; Summary; Additional Resources; Part II: More Essential Security; Chapter 5. Perimeter Security; Introduction; From Moats and Bridges to Firewalls and Filters; Firewalls; Intrusion Detection and Prevention; Summary; Additional Resources; Chapter 6. E-mail Safety; Introduction; The Evolution of E-mail; E-mail Security Concerns; Summary; Additional Resources; Chapter 7. Web Surfing Privacy and Safety; Introduction; The Revolutionary World Wide Web; Web Security Concerns; Summary; Additional Resources; Chapter 8. Wireless Network SecurityIntroductionThe Basics of Wireless Networks; Basic Wireless Network Security Measures; Additional Hotspot Security Measures; Summary; Additional Resources; Chapter 9. Spyware and Adware; Introduction; What Is Adware?; What Is Spyware?; Getting Rid of Spyware; Summary; Additional Resources; Part III: Testing and Maintenance; Chapter 10. Keeping Things Secure; Introduction; General PC Maintenance; Patches and Updates; Windows XP Security Center; Summary; Additional Resources; Chapter 11. When Disaster Strikes; Introduction; Check the Event Logs; Enable Security AuditingReview Your Firewall LogsScan Your Computer; Restore Your System; Start from Scratch; Restore Your Data; Call In the Pros; Summary; Additional Resources; Chapter 12. Microsoft Alternatives: Inside the Linux Desktop . .; Introduction; Common Desktop Environments; The X Window System and Window Managers; E-mail and Personal Information Management Clients; Sylpheed; Essential Information; E-mail and PIM Software; Migrating Mail; Web Browsers; Office Application Suites; Running Windows Applications on Linux; Summary; Additional Resources; Part IV: Security Resources .Appendix A. Essential Network CommunicationsIntroduction; Computer Protocols; Communication Ports; TCP and UDP Protocols; Understanding IP Addresses and DNS; Managing IP Addresses; Firewalls; Appendix B. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix C. Glossary of Technology and Terminology; IndexEssential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer SecuritComputer securityComputersAccess controlPasswordsElectronic mail systemsSecurity measuresFirewalls (Computer security)InternetSecurity measuresSpam filtering (Electronic mail)Spyware (Computer software)Computer security.ComputersAccess controlPasswords.Electronic mail systemsSecurity measures.Firewalls (Computer security)InternetSecurity measures.Spam filtering (Electronic mail)Spyware (Computer software)005.8Bradley Tony1658274Carvey Harlan A523172MiAaPQMiAaPQMiAaPQBOOK9910824955503321Essential computer security4012178UNINA