LEADER 05949nam 2200841Ia 450 001 9910450902803321 005 20200520144314.0 010 $a1-281-07186-2 010 $a9786611071868 010 $a0-08-050589-9 010 $a1-59749-159-4 035 $a(CKB)1000000000339641 035 $a(EBL)319200 035 $a(OCoLC)476115205 035 $a(SSID)ssj0000149304 035 $a(PQKBManifestationID)11150959 035 $a(PQKBTitleCode)TC0000149304 035 $a(PQKBWorkID)10237659 035 $a(PQKB)11572140 035 $a(MiAaPQ)EBC319200 035 $a(CaSebORM)9781597491143 035 $a(MiAaPQ)EBC275384 035 $a(Au-PeEL)EBL319200 035 $a(CaPaEBR)ebr10150167 035 $a(CaONFJC)MIL107186 035 $a(OCoLC)437191988 035 $a(Au-PeEL)EBL275384 035 $a(OCoLC)77012578 035 $a(EXLCZ)991000000000339641 100 $a20061114d2006 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aEssential computer security$b[electronic resource] $eeveryone's guide to e-mail, internet, and wireless security /$fTony Bradley, Harlan Carvey 205 $a1st edition 210 $aRockland, MA $cSyngress Publishing$dc2006 215 $a1 online resource (321 p.) 300 $aIncludes index. 311 $a1-59749-114-4 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Essential Computer Security; Copyright Page; Contents; Foreword; Introduction; Part I: Bare Essentials; Chapter 1. Basic Windows Security; Introduction; Why Do You Need to Be Secure?; Why Are You at Risk?; Summary; Additional Resources; Chapter 2. Passwords; Introduction; Password Power; Password Cracking; Storing Your Passwords; One Super-Powerful Password; Summary; Additional Resources; Chapter 3. Viruses, Worms, and Other Malware; Introduction; Malware Terms; The History of Malware; Chapter 4. Patching; Introduction; Patch Terminology; Why Should I Patch? 327 $aHow Do I Know What to Patch?Summary; Additional Resources; Summary; Additional Resources; Part II: More Essential Security; Chapter 5. Perimeter Security; Introduction; From Moats and Bridges to Firewalls and Filters; Firewalls; Intrusion Detection and Prevention; Summary; Additional Resources; Chapter 6. E-mail Safety; Introduction; The Evolution of E-mail; E-mail Security Concerns; Summary; Additional Resources; Chapter 7. Web Surfing Privacy and Safety; Introduction; The Revolutionary World Wide Web; Web Security Concerns; Summary; Additional Resources; Chapter 8. Wireless Network Security 327 $aIntroductionThe Basics of Wireless Networks; Basic Wireless Network Security Measures; Additional Hotspot Security Measures; Summary; Additional Resources; Chapter 9. Spyware and Adware; Introduction; What Is Adware?; What Is Spyware?; Getting Rid of Spyware; Summary; Additional Resources; Part III: Testing and Maintenance; Chapter 10. Keeping Things Secure; Introduction; General PC Maintenance; Patches and Updates; Windows XP Security Center; Summary; Additional Resources; Chapter 11. When Disaster Strikes; Introduction; Check the Event Logs; Enable Security Auditing 327 $aReview Your Firewall LogsScan Your Computer; Restore Your System; Start from Scratch; Restore Your Data; Call In the Pros; Summary; Additional Resources; Chapter 12. Microsoft Alternatives: Inside the Linux Desktop . .; Introduction; Common Desktop Environments; The X Window System and Window Managers; E-mail and Personal Information Management Clients; Sylpheed; Essential Information; E-mail and PIM Software; Migrating Mail; Web Browsers; Office Application Suites; Running Windows Applications on Linux; Summary; Additional Resources; Part IV: Security Resources . 327 $aAppendix A. Essential Network CommunicationsIntroduction; Computer Protocols; Communication Ports; TCP and UDP Protocols; Understanding IP Addresses and DNS; Managing IP Addresses; Firewalls; Appendix B. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix C. Glossary of Technology and Terminology; Index 330 $aEssential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Securit 606 $aComputer security 606 $aComputers$xAccess control$xPasswords 606 $aElectronic mail systems$xSecurity measures 606 $aFirewalls (Computer security) 606 $aInternet$xSecurity measures 606 $aSpam filtering (Electronic mail) 606 $aSpyware (Computer software) 608 $aElectronic books. 615 0$aComputer security. 615 0$aComputers$xAccess control$xPasswords. 615 0$aElectronic mail systems$xSecurity measures. 615 0$aFirewalls (Computer security) 615 0$aInternet$xSecurity measures. 615 0$aSpam filtering (Electronic mail) 615 0$aSpyware (Computer software) 676 $a005.8 700 $aBradley$b Tony$01054261 701 $aCarvey$b Harlan A$0523172 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910450902803321 996 $aEssential computer security$92486707 997 $aUNINA