Table of Contents


book cover
Absolute Beginner's Guide To: Security, Spam, Spyware & Viruses
By Andy  Walker
...............................................
Publisher: Que
Pub Date: November 09, 2005
Print ISBN-10: 0-7897-3459-1
Print ISBN-13: 978-0-7897-3459-4
Pages: 384
 



Table of Contents    Index

      Copyright
      About the Author
      Foreword
      Acknowledgments
      We Want to Hear from You!
      Introduction: Ignore This Book at Your Own Peril!
      How This Book Is Organized
        Chapter 1Viruses: Attack of the Malicious Programs
        Chapter 2Spyware: Overrun by Advertisers, Hijackers, and Opportunists
        Chapter 3Hackers: There's a Man in My Machine
        Chapter 4Identity Thieves and Phishers: Protect Your Good Name and Bank Account
        Chapter 5Spam: Unwanted Email from Hell
        Chapter 6Wireless Network Snoops: Lock Down Your Wi-Fi Network
        Chapter 7Privacy Snoops: Cover Your Tracks and Your Reputation
        Chapter 8Let's Smash-Proof Windows: Tweak Windows XP Nice and Tight
        Chapter 9Starting from the Beginning: Wiping a Hard Drive and Rebuilding from the Ground Up
        Chapter 10Ongoing Maintenance: Fend Off Future Threats!
        Chapter 11Selecting Software: Steals, Deals, and Software Duds
        Chapter 12Tools of the Trade: Security Products You Should Own
        Glossary
      Special Elements Used in this Book
      Reader Competition...of Sorts
      Part I:   Security Basics: Some Very Real Threats
            Chapter 1.   Viruses: Attack of the Malicious Programs
        What Is a Computer Virus?
        Viruses: As Many Kinds As Sniffles in Kindergarten
        Who Creates Computer Viruses?
        What Not to Do!
        When Viruses Attack!
        Now I Have Your Attention...
        Antivirus Checkup: 10-Minute Tactics
        Fortify Your Computer: Strong Virus Defense in a Few Hours
        No Worm in My Apple?
        Is That a Virus in Your Pocket?
            Chapter 2.   Spyware: Overrun by Advertisers, Hijackers, and Opportunists
        What Is Spyware?
        What Does Spyware Do and Why Is It Bad?
        How Does Spyware Sneak onto My Computer?
        Types of Spyware: Snoops, Adware, Cookies, and More
        Who Is at Risk?
        How Do I Know If I Have Spyware?
        Defend Yourself Against Spyware
        Ban All Spies: Strong Spyware Defense in an Afternoon
            Chapter 3.   Hackers: There's a Man in My Machine
        What Is a Hacker?
        Who Are the Hackers?
        What Damage Can Hackers Do?
        Targets of a Hack Attack
        Hacker Motivation: I Think Therefore I Hack
        Tools of the Trade: Pass Me a Trojan Horse, Would You?
        Firewall: Shut Out the Hackers
        Software Firewalls: Programs That Stop Hackers
        How to Detect a Hacker Attack
        How to Fix a Hacker Attack
        Batten down the Hatches10-Minute Tactics
        Wall off the WorldInstall a Better Firewall in an Afternoon
            Chapter 4.   Identity Thieves and Phishers: Protect Your Good Name and Bank Account
        What Is Identity Theft?
        What Is Phishing?
        How Does Phishing Work?
        What Is Pharming?
        What Damage Can Be Done By Phishing?
        Who Is at Risk? Everyone!
        Don't Get Phished: 10-Minute Tactics to Stay Off the Hook
        Ensure You Are You: Take an Afternoon to Protect Your Identity
            Chapter 5.   Spam: Unwanted Email from Hell
        What Is Spam?
        Why Does Spam Keep Coming?
        Why Doesn't Someone Stop the Spammers?
        How Do Spammers Get My Email Address?
        The Damage Spam Can Do
        Kill More SpamIn an Afternoon
            Chapter 6.   Wireless Network Snoops: Lock Down Your Wi-Fi Network
        What Is a Wireless Home Network?
        What Damage Can a Wireless Network Snoop Dish Out?
        Who Are the Snoopers?
        Your Wi-Fi Network Is Full of Holes!
        First Line of Defense: Secure Your Wi-Fi Network
        Detecting a Visit from a Wireless Snoop
        I'm Under Attack! What to Do If You Discover a Wireless Network Snoop
        Wireless Security Workup: Quick Tactics and Some That Take a Little More Time
            Chapter 7.   Privacy Snoops: Cover Your Tracks and Your Reputation
        Why Your Privacy Is Important
        What You Leave Behind on Your Computer
        Who Are the Privacy Snoops?
        The Consequences of Being Caught
        Emergency TacticsI Am Being Snooped On!
        Obscure Your TrailIn About 10 Minutes
        Cover Your TracksIn an Afternoon
        Clean Multimedia Players
      Part II:   Strategies for safe and secure computing
            Chapter 8.   Let's Smash-Proof Windows: Tweak Windows XP Nice and Tight
        If Windows XP Is a Dike, You're a Little Dutch Boy
            Chapter 9.   Starting from the Beginning: Wiping a Hard Drive and Rebuilding from the Ground Up
        Light the Fuse and Stand Back
        Let's Get Started
        Step 1: Download Drivers and Software You Need for the Re-install
        Step 2: Back Up!
        Step 3: Pull the Plug on the Network
        Step 4: Wipe Away Windows
        Step 5: Re-install Windows
        Step 6: Re-install Your Drivers
        Step 7: Install Protection Against Malware
        Step 8a: Install Windows XP Service Pack 2 (from CD)
        Step 8b: Install SP2 from the Internet
        Step 9: Configure Your Security Settings
        Step 10: Install Firefox
        Step 11: Configure Your Networking
        Step 12: Update Windows with All Recent Security Patches
        Step 13: Update All of Your Security Programs and Security Signatures
        Step 14: Activate Windows
        Step 15: Re-install Your Programs
        Step 16: Other Things You Can Do
            Chapter 10.   Ongoing Maintenance: Fend Off Future Threats!
        Note to Self: Keep Computer Secure
        Daily Routines: Walk the Dog, Feed the Kids, and Secure the Computer
        Weekly Routines: How to Never Be Bored on Saturday Morning
        Monthly Routines: Clean the Garage, Trim the Hedge, and Update Windows
        Bathe Once a Year Whether You Need It and Reformat and Re-install, Too
      Part III:   Tools for Maintenance and Protection
            Chapter 11.   Selecting Software: Steals, Deals, and Software Duds
        Security Software: Nothing in Life Is Free, Except Software
        Weirdware: When It's Not Payware or Freeware
        What Should I Pay for My Security Toolbox?
        Choosing the Right Security Software
            Chapter 12.   Tools of the Trade: Security Products You Should Own
        Which Security Software Is Right for You?
        Antivirus Programs
        Anti-Spyware
        Firewalls
        Anti-Spam
      Part IV:   Appendixes
           Glossary
       
        A
        B
        C
        D
        E
        F
        G-H
        I-J
        K-L
        M-N
        O-P
        Q-R
        S
        T-U-V
        W-X-Y-Z
      Index



Absolute Beginners Guide To. Security, Spam, Spyware & Viruses
Absolute Beginners Guide to Security, Spam, Spyware & Viruses
ISBN: 0789734591
EAN: 2147483647
Year: 2005
Pages: 168

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net