rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781597491143

Essential Computer Security : Everyone's Guide to Email, Internet, and Wireless Security

by
  • ISBN13:

    9781597491143

  • ISBN10:

    1597491144

  • Format: Paperback
  • Copyright: 2006-12-31
  • Publisher: Elsevier Science
  • Purchase Benefits
List Price: $33.95 Save up to $0.03
  • Buy New
    $33.92

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

Summary

Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves. Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Security is a source of jargon-less advice everyone needs to operate their computer securely. * Written in easy to understand non-technical language that novices can comprehend * Provides detailed coverage of the essential security subjects that everyone needs to know * Covers just enough information to educate without being overwhelming

Table of Contents

Foreword xix
Intro xxi
Part I: Bare Essentials
1(64)
Basic Windows Security
3(26)
Introduction
4(1)
Why Do You Need to Be Secure?
4(1)
Why Are You at Risk?
5(23)
Malware
5(1)
Weak Passwords
6(1)
Physical Security
6(1)
Network``Neighbors''
6(1)
Logging In
7(1)
User Accounts
7(2)
Limiting the Number of Accounts
9(2)
Disabling the Guest Account
11(1)
Renaming the Administrator Account
12(1)
Creating a Dummy Administrator Account
13(1)
Security Groups
13(2)
Windows XP Home Account Types
15(1)
FAT32 versus NTFS
16(1)
File and Folder Security
16(1)
Keeping It Simple
17(1)
Sharing and Security
18(3)
Windows Services
21(3)
Hidden File Extensions
24(1)
Screen Saver
25(3)
Summary
28(1)
Additional Resources
28(1)
Passwords
29(12)
Introduction
30(1)
Password Power
30(5)
The Keys to Your Data
32(1)
Selecting Strong Passwords
33(2)
Password Cracking
35(1)
Storing Your Passwords
36(1)
One Super-Powerful Password
37(2)
Summary
39(1)
Additional Resources
39(2)
Viruses, Worms, and Other Malware
41(12)
Introduction
42(1)
Malware Terms
42(1)
The History of Malware
43(9)
Protect Yourself with Antivirus Software
44(3)
Keep Your Antivirus Software Updated
47(2)
How Not to Get Infected
49(1)
Do You Think You're Infected?
49(3)
Summary
52(1)
Additional Resources
52(1)
Patching
53(12)
Introduction
54(1)
Patch Terminology
54(1)
Why Should I Patch?
55(1)
How Do I Know What to Patch?
56(8)
Patching Precautions
60(4)
Summary
64(1)
Additional Resources
64(1)
Part II: More Essential Security
65(86)
Perimeter Security
67(18)
Introduction
68(1)
From Moats and Bridges to Firewalls and Filters
68(1)
Firewalls
69(11)
Network Traffic Flow
70(1)
Routers and Ports
71(1)
Packet Routing and Filtering
72(1)
Stateful Inspection
73(1)
Application Gateways and Application Proxy Firewalls
74(1)
Personal and Cable/DSL Router Firewalls
74(6)
Intrusion Detection and Prevention
80(4)
Summary
84(1)
Additional Resources
84(1)
E-mail Safety
85(18)
Introduction
86(1)
The Evolution of E-mail
86(1)
E-mail Security Concerns
86(16)
Opening Attachments
87(4)
Web-Based versus POP3 E-mail
91(1)
Spoofed Addresses
92(1)
Spam
93(4)
Hoaxes and Phishing
97(5)
Summary
102(1)
Additional Resources
102(1)
Web Surfing Privacy and Safety
103(20)
Introduction
104(1)
The Revolutionary World Wide Web
104(2)
Web Security Concerns
106(15)
Cookies
106(3)
Privacy and Anonymous Surfing
109(3)
Getting in the Zone
112(4)
Shopping Safely: SSL and Certificates
116(1)
Financial Transactions
117(2)
Content Filtering and Childproofing
119(2)
Summary
121(1)
Additional Resources
121(2)
Wireless Network Security
123(16)
Introduction
124(1)
The Basics of Wireless Networks
124(4)
802.11b
126(1)
802.11a
127(1)
802.11g
127(1)
Next-Generation Protocols
127(1)
Basic Wireless Network Security Measures
128(6)
Secure Your Home Wireless Network
128(1)
Change the SSID
129(1)
Configure Your Home Wireless Network
130(1)
Restrict Access to Your Home Wireless Network
130(1)
Use Encryption in Your Home Wireless Network
131(1)
Review Your Logs
132(1)
Use Public Wireless Networks Safely
133(1)
Install Up-to-Date Antivirus Software
133(1)
Install a Personal Firewall
133(1)
Additional Hotspot Security Measures
134(3)
Verify Your Hotspot Connection
134(1)
Watch Your Back
135(1)
Use Encryption and Password Protection
135(1)
Don't Linger
136(1)
Use a VPN
136(1)
Use Web-Based E-mail
136(1)
Summary
137(1)
Additional Resources
137(2)
Spyware and Adware
139(12)
Introduction
140(1)
What Is Adware?
140(4)
What Is Spyware?
144(1)
Getting Rid of Spyware
145(5)
Summary
150(1)
Additional Resources
150(1)
Part III: Testing and Maintenance
151(68)
Keeping Things Secure
153(12)
Introduction
154(1)
General PC Maintenance
154(7)
Disk Cleanup
155(2)
Erase the PageFile
157(1)
Disk Defragmenter
158(1)
Scheduled Tasks
159(2)
Patches and Updates
161(1)
Windows XP Security Center
162(2)
Summary
164(1)
Additional Resources
164(1)
When Disaster Strikes
165(14)
Introduction
166(1)
Check the Event Logs
166(1)
Enable Security Auditing
167(3)
Review Your Firewall Logs
170(1)
Scan Your Computer
171(2)
Restore Your System
173(1)
Start from Scratch
174(1)
Restore Your Data
175(1)
Call In the Pros
175(1)
Summary
176(1)
Additional Resources
177(2)
Microsoft Alternatives: Inside the Linux Desktop
179(40)
Introduction
180(1)
Common Desktop Environments
180(5)
Gnome
181(2)
KDE
183(1)
Common Features
184(1)
Install Both, Make One the Default
185(1)
Alternative Window Managers
185(1)
The X Window System and Window Managers
185(5)
X Window Servers versus Window Managers
186(2)
Window Managers as Alternative Desktop Environments
188(2)
E-mail and Personal Information Management Clients
190(12)
Evolution
190(2)
Evolution, Microsoft Exchange, Novell GroupWise, and OpenExchange
192(1)
KDE Suite/KMail
192(1)
Kontact
192(1)
Aethera
193(1)
Mozilla Mail/Thunderbird
194(1)
Thunderbird
195(1)
Sylpheed
195(1)
Essential Information
196(1)
E-mail and PIM Software
196(1)
Migrating Mail
197(1)
Migrating from Outlook or Outlook Express
197(1)
Importing Outlook Mail into Mozilla
198(1)
LibPST
199(1)
Importing Outlook Mail into Evolution
199(2)
Document Standards
201(1)
The Hard Way
201(1)
Web Browsers
202(7)
Mozilla
202(1)
Mozilla and Microsoft CHAP
203(1)
Firefox
203(1)
Galeon
204(1)
Konqueror
205(1)
Opera
205(1)
Migrating Bookmarks
206(1)
Browser Plug-Ins
206(1)
Macromedia Flash and Shockwave/Director
206(1)
RealPlayer
207(1)
Adobe Acrobat Reader
208(1)
Office Application Suites
209(5)
OpenOffice.org
209(3)
Limitations: Macros and PDF Files
212(1)
Future Plans
213(1)
StarOffice
213(1)
KOffice
213(1)
Hancom Office
214(1)
Running Windows Applications on Linux
214(4)
Compatibility Layer Software
215(1)
Wine
216(1)
Code Weavers' CrossOver Office
216(2)
Summary
218(1)
Additional Resources
218(1)
Part IV: Security Resources
219(2)
Appendix A Essential Network Communications
221(8)
Introduction
222(1)
Computer Protocols
222(1)
Communication Ports
223(1)
TCP and UDP Protocols
223(1)
Understanding IP Addresses and DNS
224(2)
Managing IP Addresses
226(1)
Firewalls
227(2)
Appendix B Case Study: SOHO (Five Computers, Printer, Servers, etc.)
229(24)
Introduction
230(9)
Using netstat to Determine Open Ports on a System
230(5)
Determining More Information with lsof
235(1)
Using netstat on Windows XP
236(3)
Employing a Firewall in a SOHO Environment
239(1)
Host-Based Firewall Solutions
239(1)
Introducing the SOHO Firewall Case Study
240(1)
Assessing Needs
240(1)
Defining the Scope of the Case Study
241(1)
Designing the SOHO Firewall
241(9)
Determining the Functional Requirements
242(1)
Determining the Needs of the Family
242(1)
Talking to Local User Groups
242(1)
Creating a Site Survey of the Home
243(1)
Identifying Current Technology Options and Constraints
244(1)
Implementing the SOHO Firewall
245(1)
Assembling the Components
245(1)
Installing the Components
245(1)
Installing the Wireless Cards
246(3)
Testing the Configuration from Various Access Points
249(1)
Summary
250(1)
Solutions Fast Track
251(1)
Frequently Asked Questions
252(1)
Appendix C Glossary of Technology and Terminology
253(16)
Index 269

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program