Foreword | p. 11 |
Introduction | p. 15 |
Is This Book for Me? | p. 20 |
How This Book is Organized | p. 21 |
Malware: A Comprehensive Introduction | p. 23 |
Spyware | p. 27 |
Adware | p. 27 |
Viruses | p. 28 |
Spam | p. 29 |
Spoofing | p. 30 |
Phishing | p. 32 |
Worms | p. 32 |
Trojans | p. 32 |
SQL injection | p. 33 |
Hijack | p. 34 |
Rootkits | p. 35 |
Bots | p. 37 |
Impact of Malware | p. 38 |
Computer Viruses: Are You at Risk? | p. 43 |
Types of Viruses | p. 46 |
How Viruses Infect Computers | p. 51 |
Capabilities of a Virus | p. 52 |
Locations Where a Virus is Most Commonly Found | p. 55 |
Impact of Viruses on Computer Operating Systems | p. 56 |
Virus Removal Methods | p. 58 |
Antivirus Solutions & Defense | p. 63 |
Spam, Spoofing, Phishing, & E-Mail Hoaxes: What They Are and How to Block Them | p. 83 |
Spoofing | p. 84 |
Phishing | p. 87 |
Whaling | p. 91 |
Pharming | p. 91 |
CAN-SPAM Act | p. 92 |
Hoaxes | p. 99 |
Spam Virus E-Mails | p. 102 |
E-Mail Relaying | p. 103 |
Spam Tools | p. 104 |
The 10 Most Common E-mail Scams and How to Defend Against Them | p. 109 |
Detecting and Countering Malware & Spyware | p. 121 |
Viruses | p. 125 |
Worms | p. 125 |
Trojan Horse | p. 127 |
Rootkits | p. 130 |
Adware | p. 134 |
Crimeware | p. 135 |
Grayware | p. 136 |
Denial of Service Attack | p. 137 |
Robots | p. 139 |
SQL Injection Attack | p. 139 |
Cross-Site Scripting (XSS) | p. 140 |
Cross-Site Forgery Request | p. 141 |
Relay Attack | p. 142 |
Web Browsers, Pop-Up Windows, & How to Surf the Web Safely | p. 153 |
Web Browsers | p. 158 |
Windows 7 Parental Controls | p. 162 |
Firewalls: A Comprehensive Introduction | p. 165 |
Basics of Information Security | p. 167 |
Internet Threats | p. 167 |
What is a Firewall? | p. 168 |
How do Firewalls Work? | p. 170 |
Virtual Private Networks | p. 172 |
Types of Firewalls | p. 172 |
Firewalls: Home and Business Networks | p. 174 |
An Introduction to Hardware and Software Firewall Products | p. 175 |
Hackers: How to Defend Against Hacks & Other Attacks | p. 185 |
Methods Hackers Use to Attack | p. 187 |
Why do People Hack? | p. 196 |
Protections Against Hacking | p. 197 |
Network Security: How to Protect and Secure your Home or Small-business Network | p. 199 |
Securing Your Home Network | p. 201 |
Securing Your Business Network | p. 203 |
Security in Windows XP Networks | p. 205 |
Security in WindowsVista Networks | p. 208 |
Security in Windows 7 Networks | p. 210 |
How are Windows 7 Networking and Network Security Improved? | p. 212 |
Hacking into a Network | p. 216 |
Advanced Network Monitoring and Protection | p. 219 |
Wireless Network Security: How to Secure Your Wireless Network | p. 223 |
Wireless PANs | p. 229 |
Wireless LANs | p. 229 |
Wireless WANs | p. 230 |
Wireless Technologies | p. 230 |
Wireless Security | p. 233 |
Security of the Physical System | p. 233 |
Privacy | p. 234 |
Hacking a Wireless System | p. 238 |
Securing Your Wireless System | p. 241 |
Wireless Networking in Windows XP | p. 245 |
Wireless Networking in Windows Vista | p. 246 |
Wireless Networking in Windows 7 | p. 247 |
Software Products to Protect Your Computers & Networks | p. 251 |
Internet Security Suites | p. 252 |
Antivirus Software | p. 257 |
Antispyware Software | p. 261 |
Antispam Software | p. 263 |
Specialty Tools and Malware Protection | p. 265 |
Personal Firewall Software | p. 266 |
Network Monitoring Software | p. 270 |
User Activity-Monitoring Software | p. 270 |
Network Detection and Monitoring (Including Wireless) | p. 272 |
Conclusion | p. 273 |
Glossary | p. 277 |
Author Biography | p. 283 |
Bibliography | p. 285 |
Index | p. 287 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.