did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781587201639

Home Network Security Simplified

by ;
  • ISBN13:

    9781587201639

  • ISBN10:

    1587201631

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2007-01-01
  • Publisher: Cisco Press
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $24.99

Summary

A straightforward, graphic-based reference book for network security for the home and small

Table of Contents

Introduction xiv
Tip 1: Use Firewalls
1(22)
Why Do I Need Firewalls?
3(2)
How Firewalls Work
5(2)
Stateful Packet Inspection Firewalls
5(1)
Personal Software Firewalls
6(1)
Putting Firewalls to Work
7(11)
Putting a Firewall Between You and the Internet
8(1)
Routers with a Built-in Firewall
8(1)
Dedicated Firewall Devices
9(1)
Enabling Personal Firewalls on Your Computers
10(1)
Windows XP Built-in Firewall
10(2)
ZoneAlarm Personal Software Firewall
12(4)
Personal Software Firewalls for Purchase
16(2)
Test Driving Your New Protection
18(2)
What to Do If You Think You've Been Hacked
20(2)
Sometimes, Firewalls Block the Good Stuff
22(1)
Summary
22(1)
Where to Go for More Information
22(1)
Tip 2: Secure Your Wireless Network
23(30)
Why Should I Care About Wireless Network Security?
25(1)
What Do I Do About Wireless Security?
26(5)
Change Your Password
27(1)
Do Not Advertise Your Wireless Network
28(1)
Scramble Your Signal
28(3)
Disable Ad-Hoc Networking
31(1)
How to Do It: Securing Your Wireless Network
31(19)
Change the Router's Default Password
31(1)
Stop Advertising Your Wireless Network
32(1)
Enable Wireless Encryption
33(1)
Enabling WEP Encryption on the Wireless Router
33(2)
Enabling WEP Encryption on the Wireless NIC
35(9)
WPA Encryption Example
44(4)
Disable Ad-Hoc Networking
48(2)
Prevent Unintentional Roaming
50(1)
Wireless Security Checklist
50(1)
Summary
51(1)
Where to Go for More Information
52(1)
Tip 3: Use Antivirus Protection
53(24)
What Are Computer Viruses?
55(3)
Viruses
55(1)
Worms
56(1)
Trojan Horses
57(1)
Commonsense Approach to Computer Viruses
58(1)
How Antivirus Works
59(2)
Virus Detection
60(1)
Virus Prevention
60(1)
Inoculating Yourself Against Computer Viruses
61(11)
Turning On Antivirus at Your ISP
62(1)
Installing Antivirus Software on Your Computers
63(2)
Scanning Your Computer for Viruses
65(2)
Blocking New Virus Infections
67(1)
Enabling Unknown Virus Detection (Heuristics)
67(2)
Updating Your Virus Signatures
69(1)
Windows Live OneCare
70(2)
What to Do If You Think You've Been Infected
72(2)
Summary
74(1)
Where to Go for More Information
75(2)
Tip 4: Keep Your Software Updated
77(18)
Why Software Needs to Be Updated
79(1)
Updating Your Operating System
79(4)
Enabling Automatic Updates
80(2)
Manual Operating System Updates
82(1)
Updating Your Software Programs
83(2)
Using Windows Restore Points
85(5)
Creating a Restore Point
86(2)
Restoring Your Computer to a Restore Point
88(2)
What to Do If You Think Your Operating System Has Been Compromised
90(2)
Summary
92(1)
Where to Go for More Information
93(2)
Tip 5: Lock Out Spyware and Adware
95(22)
What Is Spyware and Adware?
97(2)
Adware
97(1)
Spyware
98(1)
Are Spyware and Adware Viruses?
99(1)
Preventing Spyware and Adware
99(14)
Exercising Common Sense
100(1)
Installing a Popup Blocker
100(1)
Turning On the Internet Explorer Built-in Popup Blocker
100(1)
Installing a Third-Party Popup Blocker Program
100(2)
Installing an Antispyware/Antiadware Program
102(1)
Free Antispyware/Antiadware Programs
103(5)
Windows Defender
108(4)
Antispyware/Antiadware in the Security Bundles
112(1)
What to Do If You Think You've Been Infected
113(2)
Spyware/Adware-Removal Tools
113(1)
Removing Spyware and Adware Programs Using the Installed Programs List
114(1)
Summary
115(1)
Where to Go for More Information
115(2)
Tip 6: Keep an Eye on Your Kids
117(26)
What Are the Dangers Your Kids Might Encounter Online?
119(1)
Pornography
119(1)
Predators
119(1)
Gambling
119(1)
Hacking
120(1)
Illegal Peer-to-Peer Sharing
120(1)
Maybe I Should Rethink This Internet Thing
120(1)
Preparing Kids for Being Online
121(1)
Establish and Communicate the Internet Usage Policy
121(1)
Making Kids Aware of Online Dangers
122(1)
Avoid Giving Out Personal Information Online
123(1)
Policing Kids Online
123(1)
Browse in Plain Sight
123(1)
Monitor and Review Your Kids' Websites and Blogs
124(3)
Check Out Your Kids' Blogs
125(1)
Review Website History
126(1)
Using Parental Controls
127(7)
Parental Controls at Your ISP
128(2)
Parental Controls at Your Home Network Router
130(4)
Parental Controls on Your Computers
134(4)
What to Do If You Think Your Child Is Abusing the Rules
138(4)
Activity Loggers
138(4)
Summary
142(1)
Where to Go for More Information
142(1)
Tip 7: Recognize and Avoid Phishing Scams
143(12)
How Phishing Scams Work
146(1)
Tricks of the Trade
146(3)
How to Avoid Becoming a Victim
149(4)
What to Do If You Suspect You Are the Target of a Phishing Scam
153(1)
Summary
154(1)
Where to Go for More Information
154(1)
Tip 8: Create Strong Passwords
155(8)
Anatomy of a Lousy Password
157(2)
Elements of a Strong Password
159(1)
How to Create a Strong Password That You Can Remember
159(1)
Additional Password Tips
160(1)
Summary
161(1)
Where to Go for More Information
162(1)
Tip 9: Back Up Your Files
163(16)
What Should I Back Up?
165(1)
Where Do I Back Up To?
166(1)
How Often Should I Back Up?
166(1)
Storage Method Overview
167(1)
Flash Memory
167(1)
External Hard Drives
168(1)
Networked Storage
169(1)
Online Storage
170(3)
DVD or CD Storage
173(1)
Summary of Storage Options
174(1)
Putting It All Together
175(1)
Using Windows XP Backup
176(1)
Summary
177(1)
Where to Go for More Information
177(2)
Tip 10: Use Common Sense
179(8)
Urban Legends
182(1)
E-Mail Stock Tips (Pump-and-Dump Scams)
182(1)
Work from Home (Pyramid) Schemes
183(1)
Money-Exchange Schemes
183(1)
``Hot'' Merchandise Scam
184(1)
What to Do to Protect Yourself
184(1)
Summary
185(1)
Where to Go for More Information
185(2)
``They Couldn't Hit an Elephant at This Distance''
187(4)
Glossary 191(10)
Index 201

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program