CART

(0) items

How to Stop E-Mail Spam, Spyware, Malware, Computer Viruses and Hackers From Ruining Your Computer Or Network: The Complete Guide for Your Home and Work,9781601383037

How to Stop E-Mail Spam, Spyware, Malware, Computer Viruses and Hackers From Ruining Your Computer Or Network: The Complete Guide for Your Home and Work

by
ISBN13:

9781601383037

ISBN10:
1601383037
Format:
Paperback
Pub. Date:
11/30/2010
Publisher(s):
Atlantic Pub Co
List Price: $24.95
More New and Used
from Private Sellers
Starting at $0.01
See Prices

Rent Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

New Book

We're Sorry
Sold Out

Summary

It seems like everywhere you go on the Internet, there is spam, spyware, and the risk of viruses infecting your computer and ruining your online experience. In businesses alone, according to Nucleus Research Inc. spam costs more than $712 per employee each year in productivity and computing resources. Spyware slows computers, ruins files, and can result in stolen information. According to the same Nucleus Research report, the estimation on money lost by businesses due to computer viruses ranges between $100 million and $2 billion annually depending on how the total is calculated, and the cost continues to rise as every major company moves to fully digital workplaces.What this means for everyday users like you and the business you work for is that every time you download a computer virus or click on a spam e-mail on accident, you are wasting money, endangering your computer, and risking the loss of information. This complete, revolutionary book has compiled all of the vital information you need to make sure that you are able to combat the billion dollar risk of incursive software infecting your home and work computers. You will learn why there is so much spam in your inbox, how the spammer thinks and what the goals of spyware and viruses actually are. You will then learn how you can start spam proofing your inbox by never giving away personal information and using secure e-mail clients. You will learn how companies get spyware onto your hard drive and what you can do to block it from appearing. Learn which viruses have caused the most damage and how they infect your computer and which software is most effective in blocking the download and infestation of them onto your hard drives.You will learn the value of a good firewall, what it does to stop the ill will of spammers and hackers and what actions you can take to block the breach of your firewall and your computer

Table of Contents

Forewordp. 11
Introductionp. 15
Is This Book for Me?p. 20
How This Book is Organizedp. 21
Malware: A Comprehensive Introductionp. 23
Spywarep. 27
Adwarep. 27
Virusesp. 28
Spamp. 29
Spoofingp. 30
Phishingp. 32
Wormsp. 32
Trojansp. 32
SQL injectionp. 33
Hijackp. 34
Rootkitsp. 35
Botsp. 37
Impact of Malwarep. 38
Computer Viruses: Are You at Risk?p. 43
Types of Virusesp. 46
How Viruses Infect Computersp. 51
Capabilities of a Virusp. 52
Locations Where a Virus is Most Commonly Foundp. 55
Impact of Viruses on Computer Operating Systemsp. 56
Virus Removal Methodsp. 58
Antivirus Solutions & Defensep. 63
Spam, Spoofing, Phishing, & E-Mail Hoaxes: What They Are and How to Block Themp. 83
Spoofingp. 84
Phishingp. 87
Whalingp. 91
Pharmingp. 91
CAN-SPAM Actp. 92
Hoaxesp. 99
Spam Virus E-Mailsp. 102
E-Mail Relayingp. 103
Spam Toolsp. 104
The 10 Most Common E-mail Scams and How to Defend Against Themp. 109
Detecting and Countering Malware & Spywarep. 121
Virusesp. 125
Wormsp. 125
Trojan Horsep. 127
Rootkitsp. 130
Adwarep. 134
Crimewarep. 135
Graywarep. 136
Denial of Service Attackp. 137
Robotsp. 139
SQL Injection Attackp. 139
Cross-Site Scripting (XSS)p. 140
Cross-Site Forgery Requestp. 141
Relay Attackp. 142
Web Browsers, Pop-Up Windows, & How to Surf the Web Safelyp. 153
Web Browsersp. 158
Windows 7 Parental Controlsp. 162
Firewalls: A Comprehensive Introductionp. 165
Basics of Information Securityp. 167
Internet Threatsp. 167
What is a Firewall?p. 168
How do Firewalls Work?p. 170
Virtual Private Networksp. 172
Types of Firewallsp. 172
Firewalls: Home and Business Networksp. 174
An Introduction to Hardware and Software Firewall Productsp. 175
Hackers: How to Defend Against Hacks & Other Attacksp. 185
Methods Hackers Use to Attackp. 187
Why do People Hack?p. 196
Protections Against Hackingp. 197
Network Security: How to Protect and Secure your Home or Small-business Networkp. 199
Securing Your Home Networkp. 201
Securing Your Business Networkp. 203
Security in Windows XP Networksp. 205
Security in WindowsVista Networksp. 208
Security in Windows 7 Networksp. 210
How are Windows 7 Networking and Network Security Improved?p. 212
Hacking into a Networkp. 216
Advanced Network Monitoring and Protectionp. 219
Wireless Network Security: How to Secure Your Wireless Networkp. 223
Wireless PANsp. 229
Wireless LANsp. 229
Wireless WANsp. 230
Wireless Technologiesp. 230
Wireless Securityp. 233
Security of the Physical Systemp. 233
Privacyp. 234
Hacking a Wireless Systemp. 238
Securing Your Wireless Systemp. 241
Wireless Networking in Windows XPp. 245
Wireless Networking in Windows Vistap. 246
Wireless Networking in Windows 7p. 247
Software Products to Protect Your Computers & Networksp. 251
Internet Security Suitesp. 252
Antivirus Softwarep. 257
Antispyware Softwarep. 261
Antispam Softwarep. 263
Specialty Tools and Malware Protectionp. 265
Personal Firewall Softwarep. 266
Network Monitoring Softwarep. 270
User Activity-Monitoring Softwarep. 270
Network Detection and Monitoring (Including Wireless)p. 272
Conclusionp. 273
Glossaryp. 277
Author Biographyp. 283
Bibliographyp. 285
Indexp. 287
Table of Contents provided by Ingram. All Rights Reserved.


Please wait while the item is added to your cart...