dummies
 

Suchen und Finden

Titel

Autor/Verlag

Inhaltsverzeichnis

Nur ebooks mit Firmenlizenz anzeigen:

 

Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

T. Bradley

 

Verlag Elsevier Trade Monographs, 2006

ISBN 9780080505893 , 279 Seiten

Format PDF, ePUB, OL

Kopierschutz DRM

Geräte

24,95 EUR


 

Front Cover

1

Essential Computer Security

4

Copyright Page

5

Contents

12

Foreword

20

Introduction

22

Part I: Bare Essentials

28

Chapter 1. Basic Windows Security

30

Introduction

31

Why Do You Need to Be Secure?

31

Why Are You at Risk?

32

Summary

55

Additional Resources

55

Chapter 2. Passwords

56

Introduction

57

Password Power

57

Password Cracking

62

Storing Your Passwords

63

One Super-Powerful Password

64

Summary

66

Additional Resources

66

Chapter 3. Viruses, Worms, and Other Malware

68

Introduction

69

Malware Terms

69

The History of Malware

70

Summary

91

Additional Resources

91

Chapter 4. Patching

80

Introduction

81

Patch Terminology

81

Why Should I Patch?

82

How Do I Know What to Patch?

83

Summary

91

Additional Resources

91

Part II: More Essential Security

92

Chapter 5. Perimeter Security

94

Introduction

95

From Moats and Bridges to Firewalls and Filters

95

Firewalls

96

Intrusion Detection and Prevention

107

Summary

111

Additional Resources

111

Chapter 6. E-mail Safety

112

Introduction

113

The Evolution of E-mail

113

E-mail Security Concerns

113

Summary

129

Additional Resources

129

Chapter 7. Web Surfing Privacy and Safety

130

Introduction

131

The Revolutionary World Wide Web

131

Web Security Concerns

133

Summary

148

Additional Resources

148

Chapter 8. Wireless Network Security

150

Introduction

151

The Basics of Wireless Networks

151

Basic Wireless Network Security Measures

155

Additional Hotspot Security Measures

161

Summary

164

Additional Resources

164

Chapter 9. Spyware and Adware

166

Introduction

167

What Is Adware?

167

What Is Spyware?

171

Getting Rid of Spyware

172

Summary

177

Additional Resources

177

Part III: Testing and Maintenance

178

Chapter 10. Keeping Things Secure

180

Introduction

181

General PC Maintenance

181

Patches and Updates

188

Windows XP Security Center

189

Summary

191

Additional Resources

191

Chapter 11. When Disaster Strikes

192

Introduction

193

Check the Event Logs

193

Enable Security Auditing

194

Review Your Firewall Logs

197

Scan Your Computer

198

Restore Your System

200

Start from Scratch

201

Restore Your Data

202

Call In the Pros

202

Summary

203

Additional Resources

204

Chapter 12. Microsoft Alternatives: Inside the Linux Desktop . .

206

Introduction

207

Common Desktop Environments

207

The X Window System and Window Managers

212

E-mail and Personal Information Management Clients

217

Sylpheed

222

Essential Information

223

E-mail and PIM Software

223

Migrating Mail

224

Web Browsers

229

Office Application Suites

236

Running Windows Applications on Linux

241

Summary

245

Additional Resources

245

Part IV: Security Resources .

246

Appendix A. Essential Network Communications

248

Introduction

249

Computer Protocols

249

Communication Ports

250

TCP and UDP Protocols

250

Understanding IP Addresses and DNS

251

Managing IP Addresses

253

Firewalls

254

Appendix B. Case Study: SOHO (Five Computers, Printer, Servers, etc.)

256

Introduction

257

Employing a Firewall in a SOHO Environment

266

Introducing the SOHO Firewall Case Study

267

Designing the SOHO Firewall

268

Summary

277

Solutions Fast Track

278

Frequently Asked Questions

279

Appendix C. Glossary of Technology and Terminology

280

Index

296