Suchen und Finden
Service
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
T. Bradley
Verlag Elsevier Trade Monographs, 2006
ISBN 9780080505893 , 279 Seiten
Format PDF, ePUB, OL
Kopierschutz DRM
Geräte
Front Cover
1
Essential Computer Security
4
Copyright Page
5
Contents
12
Foreword
20
Introduction
22
Part I: Bare Essentials
28
Chapter 1. Basic Windows Security
30
Introduction
31
Why Do You Need to Be Secure?
31
Why Are You at Risk?
32
Summary
55
Additional Resources
55
Chapter 2. Passwords
56
Introduction
57
Password Power
57
Password Cracking
62
Storing Your Passwords
63
One Super-Powerful Password
64
Summary
66
Additional Resources
66
Chapter 3. Viruses, Worms, and Other Malware
68
Introduction
69
Malware Terms
69
The History of Malware
70
Summary
91
Additional Resources
91
Chapter 4. Patching
80
Introduction
81
Patch Terminology
81
Why Should I Patch?
82
How Do I Know What to Patch?
83
Summary
91
Additional Resources
91
Part II: More Essential Security
92
Chapter 5. Perimeter Security
94
Introduction
95
From Moats and Bridges to Firewalls and Filters
95
Firewalls
96
Intrusion Detection and Prevention
107
Summary
111
Additional Resources
111
Chapter 6. E-mail Safety
112
Introduction
113
The Evolution of E-mail
113
E-mail Security Concerns
113
Summary
129
Additional Resources
129
Chapter 7. Web Surfing Privacy and Safety
130
Introduction
131
The Revolutionary World Wide Web
131
Web Security Concerns
133
Summary
148
Additional Resources
148
Chapter 8. Wireless Network Security
150
Introduction
151
The Basics of Wireless Networks
151
Basic Wireless Network Security Measures
155
Additional Hotspot Security Measures
161
Summary
164
Additional Resources
164
Chapter 9. Spyware and Adware
166
Introduction
167
What Is Adware?
167
What Is Spyware?
171
Getting Rid of Spyware
172
Summary
177
Additional Resources
177
Part III: Testing and Maintenance
178
Chapter 10. Keeping Things Secure
180
Introduction
181
General PC Maintenance
181
Patches and Updates
188
Windows XP Security Center
189
Summary
191
Additional Resources
191
Chapter 11. When Disaster Strikes
192
Introduction
193
Check the Event Logs
193
Enable Security Auditing
194
Review Your Firewall Logs
197
Scan Your Computer
198
Restore Your System
200
Start from Scratch
201
Restore Your Data
202
Call In the Pros
202
Summary
203
Additional Resources
204
Chapter 12. Microsoft Alternatives: Inside the Linux Desktop . .
206
Introduction
207
Common Desktop Environments
207
The X Window System and Window Managers
212
E-mail and Personal Information Management Clients
217
Sylpheed
222
Essential Information
223
E-mail and PIM Software
223
Migrating Mail
224
Web Browsers
229
Office Application Suites
236
Running Windows Applications on Linux
241
Summary
245
Additional Resources
245
Part IV: Security Resources .
246
Appendix A. Essential Network Communications
248
Introduction
249
Computer Protocols
249
Communication Ports
250
TCP and UDP Protocols
250
Understanding IP Addresses and DNS
251
Managing IP Addresses
253
Firewalls
254
Appendix B. Case Study: SOHO (Five Computers, Printer, Servers, etc.)
256
Introduction
257
Employing a Firewall in a SOHO Environment
266
Introducing the SOHO Firewall Case Study
267
Designing the SOHO Firewall
268
Summary
277
Solutions Fast Track
278
Frequently Asked Questions
279
Appendix C. Glossary of Technology and Terminology
280
Index
296
Service
Shop