LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the… Read more
LIMITED OFFER
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Instructions for online access
Acknowledgments
Dedication
Author Acknowledgments
Lead Author
Contributing Authors
Technical Editor
Foreword
Introduction
Part I: Bare Essentials
Chapter 1: Basic Windows Security
Introduction
Why Do You Need to Be Secure?
Why Are You at Risk?
Summary
Additional Resources
Chapter 2: Passwords
Introduction
Password Power
Password Cracking
Storing Your Passwords
One Super-Powerful Password
Summary
Additional Resources
Chapter 3: Viruses, Worms, and Other Malware
Introduction
Malware Terms
The History of Malware
Summary
Additional Resources
Chapter 4: Patching
Introduction
Patch Terminology
Why Should I Patch?
How Do I Know What to Patch?
Summary
Additional Resources
Part II: More Essential Security
Chapter 5: Perimeter Security
Introduction
From Moats and Bridges to Firewalls and Filters
Firewalls
Intrusion Detection and Prevention
Summary
Additional Resources
Chapter 6: E-mail Safety
Introduction
The Evolution of E-mail
E-mail Security Concerns
Summary
Additional Resources
Chapter 7: Web Surfing Privacy and Safety
Introduction
The Revolutionary World Wide Web
Web Security Concerns
Summary
Additional Resources
Chapter 8: Wireless Network Security
Introduction
The Basics of Wireless Networks
Basic Wireless Network Security Measures
Additional Hotspot Security Measures
Summary
Additional Resources
Chapter 9: Spyware and Adware
Introduction
What Is Adware?
What Is Spyware?
Getting Rid of Spyware
Summary
Additional Resources
Part III: Testing and Maintenance
Chapter 10: Keeping Things Secure
Introduction
General PC Maintenance
Patches and Updates
Windows XP Security Center
Summary
Additional Resources
Chapter 11: When Disaster Strikes
Introduction
Check the Event Logs
Enable Security Auditing
Review Your Firewall Logs
Scan Your Computer
Restore Your System
Start from Scratch
Restore Your Data
Call In the Pros
Summary
Additional Resources
Chapter 12: Microsoft Alternatives
Introduction
Common Desktop Environments
The X Window System and Window Managers
E-mail and Personal Information Management Clients
Web Browsers
Office Application Suites
Running Windows Applications on Linux
Summary
Additional Resources
Part IV: Security Resources
Appendix A: Essential Network Communications
Introduction
Computer Protocols
Communication Ports
TCP and UDP Protocols
Understanding IP Addresses and DNS
Managing IP Addresses
Firewalls
Appendix B: Case Study
Introduction
Employing a Firewall in a SOHO Environment
Introducing the SOHO Firewall Case Study
Designing the SOHO Firewall
Summary
Solutions Fast Track
Frequently Asked Questions
Appendix C: Glossary of Technology and Terminology
Index
TB
He has on average over 600,000 page views per month and 25,000 subscribers to his weekly newsletter. He created a 10-part Computer Security 101 Class which has had thousands of participants since its creation and continues to gain in popularity through word of mouth.