Flylib.com
Home Network Security Simplified
Home Network Security Simplified
ISBN: 1587201631
EAN: 2147483647
Year: N/A
Pages: 130
Authors:
Jim Doherty
,
Neil Anderson
BUY ON AMAZON
Home Network Security Simplified
Table of Contents
Copyright
About the Authors
Acknowledgments
Introduction
Chapter 1. Tip 1: Use Firewalls
Why Do I Need Firewalls?
How Firewalls Work
Putting Firewalls to Work
Test Driving Your New Protection
What to Do If You Think You ve Been Hacked
Sometimes, Firewalls Block the Good Stuff
Summary
Where to Go for More Information
Chapter 2. Tip 2: Secure Your Wireless Network
Why Should I Care About Wireless Network Security?
What Do I Do About Wireless Security?
How to Do It: Securing Your Wireless Network
Wireless Security Checklist
Summary
Where to Go for More Information
Chapter 3. Tip 3: Use Antivirus Protection
What Are Computer Viruses?
Commonsense Approach to Computer Viruses
How Antivirus Works
Inoculating Yourself Against Computer Viruses
What to Do If You Think You ve Been Infected
Summary
Where to Go for More Information
Chapter 4. Tip 4: Keep Your Software Updated
Why Software Needs to Be Updated
Updating Your Operating System
Updating Your Software Programs
Using Windows Restore Points
What to Do If You Think Your Operating System Has Been Compromised
Summary
Where to Go for More Information
Chapter 5. Tip 5: Lock Out Spyware and Adware
What Is Spyware and Adware?
Preventing Spyware and Adware
What to Do If You Think You ve Been Infected
Summary
Where to Go for More Information
Chapter 6. Tip 6: Keep an Eye on Your Kids
What Are the Dangers Your Kids Might Encounter Online?
Maybe I Should Rethink This Internet Thing
Preparing Kids for Being Online
Policing Kids Online
What to Do If You Think Your Child Is Abusing the Rules
Summary
Where to Go for More Information
Chapter 7. Tip 7: Recognize and Avoid Phishing Scams
How Phishing Scams Work
Tricks of the Trade
How to Avoid Becoming a Victim
What to Do If You Suspect You Are the Target of a Phishing Scam
Summary
Where to Go for More Information
Chapter 8. Tip 8: Create Strong Passwords
Anatomy of a Lousy Password
Elements of a Strong Password
How to Create a Strong Password That You Can Remember
Additional Password Tips
Summary
Where to Go for More Information
Chapter 9. Tip 9: Back Up Your Files
What Should I Back Up?
Where Do I Back Up To?
How Often Should I Back Up?
Storage Method Overview
Putting It All Together
Using Windows XP Backup
Summary
Where to Go for More Information
Chapter 10. Tip 10: Use Common Sense
Urban Legends
E-Mail Stock Tips (Pump-and-Dump Scams)
Work from Home (Pyramid) Schemes
Money-Exchange Schemes
Hot Merchandise Scam
What to Do to Protect Yourself
Summary
Where to Go for More Information
Chapter 11. They Couldn t Hit an Elephant at This Distance
Glossary
Numerals
A
B
C
D
E
F
G
H
I
KL
MN
P
R
S
T
U
V
W
Index
SYMBOL
A
B
C
D
E
F
G
H
I
K
L
M
N
O
P
R
S
T
U
V
W
Z
Home Network Security Simplified
ISBN: 1587201631
EAN: 2147483647
Year: N/A
Pages: 130
Authors:
Jim Doherty
,
Neil Anderson
BUY ON AMAZON
Absolute Beginner[ap]s Guide to Project Management
The Process of Building a WBS
What Is Project Control?
Some Special Situations
Managing Project Communications
Proven Techniques for Leading Virtual Projects
The CISSP and CAP Prep Guide: Platinum Edition
Telecommunications and Network Security
Operations Security
Continuous Monitoring Process
Appendix C The Information System Security Architecture Professional (ISSAP) Certification
Appendix D The Information System Security Engineering Professional (ISSEP) Certification
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Review Questions
Summary
Java for RPG Programmers, 2nd Edition
The Java Onion
An Object Orientation
Threads
Database Access
Appendix A Using Java on the AS/400
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Gaining Drawing Strategies: Part 1
Using Layers to Organize Your Drawing
Generating Elevations
Working with Hatches and Fills
Appendix A Look at Drawing in 3D
MPLS Configuration on Cisco IOS Software
MPLS Overview
RIP PE-CE Routing Command Reference
Case Study-Inter-AS Implementing Route-Reflector and BGP Confederation in Provider Networks
Implementing AToM for Like to Like Circuits
Command Reference
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies