The Personal Internet Security Guidebook
Keeping Hackers and Crackers out of Your Home
- 1st Edition - October 5, 2001
- Latest edition
- Authors: Tim Speed, Juanita Ellis, Steffano Korper
- Language: English
The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or ca… Read more
Purchase options
The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or cable modems. This book will show you how to set up a home network and protect it from the "bad dudes." Also covered in this book is how to protect your computer on the road. Many hotels are now offering high-speed Internet access and this book will show you how to keep your computer safe in the hotel room as well as on the hotel network.
This is a how-to guide to keeping your personal computer safe on the Internet. Following the success of The Internet Security Guidebook, the authors have used their expertise to create a book specifically addressing home computers and traveling notebooks. Included in this book is a comprehensive list of vendors and services. Included are these key elements: protecting your PC on the Internet, home firewall software, how to set up a home network, protecting your PC on the road, and protecting your PC via DSL and/or cable modem.
- A comprehensive list of vendors and services that you can download or purchase
- Key elements such as: protecting your PC on the internet
- How to fully utilise home firewall software
- How to set-up a home network
- Information on protecting you PC on the road
- Information on protecting your PC via DSL and cable modems
- Edition: 1
- Latest edition
- Published: October 5, 2001
- Language: English
TS
Tim Speed
He and Juanita Ellis are the co-authors of books on Internet security and e-business.
JE
Juanita Ellis
Currently, she works with companies in helping deploy voice and data networks, converged solutions, VPN security and call center applications. In addition, she was a technical manager at Lotus/IBM for the southern, mid-Atlantic, and eastern regions of the United States. As a technical manager, she was responsible for designing and architecting enterprise-wide applications that integrated with enterprise resource planning systems, Internet technologies, and relational and transaction-based systems. She is currently an independent consultant.
SK