Flylib.com
Home Network Security Simplified
Home Network Security Simplified
ISBN: 1587201631
EAN: 2147483647
Year: N/A
Pages: 130
Authors:
Jim Doherty
,
Neil Anderson
BUY ON AMAZON
Home Network Security Simplified
Table of Contents
Copyright
About the Authors
Acknowledgments
Introduction
Chapter 1. Tip 1: Use Firewalls
Why Do I Need Firewalls?
How Firewalls Work
Putting Firewalls to Work
Test Driving Your New Protection
What to Do If You Think You ve Been Hacked
Sometimes, Firewalls Block the Good Stuff
Summary
Where to Go for More Information
Chapter 2. Tip 2: Secure Your Wireless Network
Why Should I Care About Wireless Network Security?
What Do I Do About Wireless Security?
How to Do It: Securing Your Wireless Network
Wireless Security Checklist
Summary
Where to Go for More Information
Chapter 3. Tip 3: Use Antivirus Protection
What Are Computer Viruses?
Commonsense Approach to Computer Viruses
How Antivirus Works
Inoculating Yourself Against Computer Viruses
What to Do If You Think You ve Been Infected
Summary
Where to Go for More Information
Chapter 4. Tip 4: Keep Your Software Updated
Why Software Needs to Be Updated
Updating Your Operating System
Updating Your Software Programs
Using Windows Restore Points
What to Do If You Think Your Operating System Has Been Compromised
Summary
Where to Go for More Information
Chapter 5. Tip 5: Lock Out Spyware and Adware
What Is Spyware and Adware?
Preventing Spyware and Adware
What to Do If You Think You ve Been Infected
Summary
Where to Go for More Information
Chapter 6. Tip 6: Keep an Eye on Your Kids
What Are the Dangers Your Kids Might Encounter Online?
Maybe I Should Rethink This Internet Thing
Preparing Kids for Being Online
Policing Kids Online
What to Do If You Think Your Child Is Abusing the Rules
Summary
Where to Go for More Information
Chapter 7. Tip 7: Recognize and Avoid Phishing Scams
How Phishing Scams Work
Tricks of the Trade
How to Avoid Becoming a Victim
What to Do If You Suspect You Are the Target of a Phishing Scam
Summary
Where to Go for More Information
Chapter 8. Tip 8: Create Strong Passwords
Anatomy of a Lousy Password
Elements of a Strong Password
How to Create a Strong Password That You Can Remember
Additional Password Tips
Summary
Where to Go for More Information
Chapter 9. Tip 9: Back Up Your Files
What Should I Back Up?
Where Do I Back Up To?
How Often Should I Back Up?
Storage Method Overview
Putting It All Together
Using Windows XP Backup
Summary
Where to Go for More Information
Chapter 10. Tip 10: Use Common Sense
Urban Legends
E-Mail Stock Tips (Pump-and-Dump Scams)
Work from Home (Pyramid) Schemes
Money-Exchange Schemes
Hot Merchandise Scam
What to Do to Protect Yourself
Summary
Where to Go for More Information
Chapter 11. They Couldn t Hit an Elephant at This Distance
Glossary
Numerals
A
B
C
D
E
F
G
H
I
KL
MN
P
R
S
T
U
V
W
Index
SYMBOL
A
B
C
D
E
F
G
H
I
K
L
M
N
O
P
R
S
T
U
V
W
Z
Home Network Security Simplified
ISBN: 1587201631
EAN: 2147483647
Year: N/A
Pages: 130
Authors:
Jim Doherty
,
Neil Anderson
BUY ON AMAZON
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Setting the Router Name
ISDN Interfaces
Border Gateway Protocol
Congestion Avoidance
AutoQoS
Information Dashboard Design: The Effective Visual Communication of Data
Dispelling the Confusion
Supplying Inadequate Context for the Data
Misusing or Overusing Color
Key Goals in the Visual Design Process
Maintain Consistency for Quick and Accurate Interpretation
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Unions
To Learn More
Table Constraints
Using SQL to Write SQL
Looping in SQL*Plus
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
Key #2: Improve Your Processes
When Companies Start Using Lean Six Sigma
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
The Experience of Making Improvements: What Its Like to Work on Lean Six Sigma Projects
Cultural Imperative: Global Trends in the 21st Century
Culture and Religion
Cultural Black Holes
The Pacific Rim: The Fourth Cultural Ecology
The China Phenomenon
Culture and Globalization
Comparing, Designing, and Deploying VPNs
Benefits and Drawbacks of AToM-Based L2VPNs
AToM Pseudowire Operation
Supporting Multicast Transport in MPLS Layer 3 VPNs
Enabling SSL VPNs (WebVPN) on Cisco IOS Devices
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies