Flylib.com
PC Magazine Windows Vista Security Solutions
PC Magazine Windows Vista Security Solutions
ISBN: 0470046562
EAN: 2147483647
Year: 2004
Pages: 135
Authors:
Dan DiNicolo
BUY ON AMAZON
Table of Contents
Back Cover
PC Magazine Windows Vista Security Solutions
Introduction
Part I: Getting Down to the Business of Securing Windows Vista
Chapter 1: A Short Introduction to Securing Windows Vista
The Five Golden Rules of Windows Security
The Security Map
Summary
Chapter 2: Implementing User Accounts and Logon Security
Creating User Accounts
Managing User Accounts
User Account Control and the Run As Command
Summary
Chapter 3: Implementing Password Security
Windows Vista Passwords
Implementing Password and Account Lockout Policies
Storing Passwords Securely
Implementing Additional Password Security Options
Summary
Chapter 4: Using Built-in Tools and Settings to Improve Windows Vista Security
Reviewing the Security Event Log
Using Windows Security Center
Configuring Local Security and Policy Settings
Summary
Part II: Making Surfing Safer
Chapter 5: Securing Your Web Browser
Securing Internet Explorer
Using Other Web Browsers
Summary
Chapter 6: Implementing Parental Controls
Keeping Children Safe Online
Restricting Internet Access Using Parental Controls
Using Content Filtering in Business Environments
Summary
Part III: Protecting Windows Vista Against Internet Threats
Chapter 7: Protecting Windows Vista with a Firewall
Understanding the Role of a Firewall
Configuring Windows Firewall
Using Windows Firewall with Advanced Security
Implementing Third-Party Firewall Software
Testing Your Firewall
Summary
Chapter 8: Keeping Windows Vista Patched and Protected
Windows Vista Update Options
Patching Beyond Vista
Summary
Chapter 9: Protecting Against Viruses
Understanding Viruses
Protecting Against Viruses
Removing Viruses
Summary
Chapter 10: Fighting Malware-Protecting Against Spyware, Adware, and Browser Hijackers
Protecting Against Malware
Removing Malware
Summary
Part IV: Messaging Your Way to E-mail Security
Chapter 11: The Dark Side of Spam
Understanding Spam
Fighting Spam
Summary
Chapter 12: Securing E-mail Messages Using Encryption and Digital Signatures
The Need for E-mail Security
Secure E-mail Components
How Secure E-mail Works
Obtaining, Installing, and Managing Digital Certificates
Signing and Encrypting E-mail Messages
Secure E-mail Alternatives
Summary
Part V: Protecting Your Files
Chapter 13: Controlling Access to Your Personal Files
Using Personal and Public Folders
Configuring File and Folder Security Settings Manually
Summary
Chapter 14: Improving File Security Using Encryption
Protecting Files with EFS
Using a Third-Party Encryption Solution
Summary
Chapter 15: Erasing Files and Hard Drives Securely
Erasing Files Securely
Covering Your Internet Tracks
Erasing Hard Drives Securely
Summary
Part VI: Securing Your Home Network
Chapter 16: Securing Shared Folders and Printers
Sharing Network Resources
Sharing and Securing Folders
Connecting to Shared Folders
Sharing and Securing Printers
Summary
Chapter 17: Securing Windows Vista on Wireless Networks
Securing Wireless Access Points
Limiting Access to Wireless Networks
Securing Wireless Network Traffic with Encryption
Summary
Part VII: Appendixes
Appendix A: Reinstalling Windows Vista
Installing Windows Vista
Post-Installation Tasks
Appendix B: Helpful Windows Vista Security Web Sites
Windows Help and Support Page
Microsoft Security Home Page
TechNet Security Home Page
Windows Vista Security and Protection
Windows Vista Community
PC Magazine Security Watch
The Elder Geek on Windows Vista
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W-X
Y
Z
List of Figures
List of Sidebars
PC Magazine Windows Vista Security Solutions
ISBN: 0470046562
EAN: 2147483647
Year: 2004
Pages: 135
Authors:
Dan DiNicolo
BUY ON AMAZON
Java How to Program (6th Edition) (How to Program (Deitel))
Summary
Graphics Contexts and Graphics Objects
Exercises
Synchronized Collections
Initializing an Instance Variable with Method init
Information Dashboard Design: The Effective Visual Communication of Data
Exceeding the Boundaries of a Single Screen
Highlighting Important Data Ineffectively or Not at All
Cluttering the Display with Useless Decoration
Gestalt Principles of Visual Perception
Sample CIO Dashboard
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Executing the Statement in the Buffer
Data Manipulation Statements
Taking Advantage of Unions
Indexes
Customizing Your SQL*Plus Environment
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
The ROI of Lean Six Sigma for Services
Phase 3 Mobilization
Service Process Challenges
Raising the Stakes in Service Process Improvement
Designing World-Class Services (Design for Lean Six Sigma)
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Why Office Programming?
Working with the Explorers and Inspectors Collections
Dynamic Controls
Populating a Document with Data on the Server
Advanced Topic: Deploying Network Solutions to Be Cached Locally
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Working with Groups
Adding Decorative Elements to Diagrams
Creating Timelines to View Projects at a Glance
Creating Scaled Office Spaces
Connecting Shapes in Network Diagrams
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies