Absolute PC Security and Privacy
Sybex Inc.,U.S. (Verlag)
978-0-7821-4127-6 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
An end-user level book that focuses on solving the major security and virus-related problems encountered by computer users. Unlike other books that focus on a single aspect of the problem, this book covers all the important issues - such as viruses, security, and spam. And, while other books contain a lot of theory and background that may be of interest to a high-end user or network administrator, "Absolute PC Security" presents real-world solutions to the most common problems encountered by average users.
Michael Miller has authored more than three dozen non--fiction books in the past decade, including Sybex's Discovering P2P, Discovering Bluetooth, Mastering Word 2000 Premium Edition, and PowerPoint 2000! I Didn't Know You Could Do That. He has established a strong reputation for explaining technical information to non--technical readers, and for offering useful real--world advice about complicated topics. Mr. Miller is President of the Molehill Group, a writing/consulting firm based in Indiana.
Contents at a Glance. Introduction. PART I:COMPUTER VIRUSES. Chapter 1: Understanding Computer Viruses. Chapter 2: How to Catch a Virus. Chapter 3: Boot Sector and File Infector Viruses. Chapter 4: Macro Viruses. Chapter 5: Script Viruses. Chapter 6: Trojan Horses and Worms. Chapter 7: E--mail, Chat, and Instant Messaging Viruses. Chapter 8:Virus Hoaxes. Chapter 9: Antivirus Software and Services. Chapter 10: Identifying New Threats. Chapter 11: Preventing Virus Attacks. Chapter 12: Dealing with a Virus Attack. PART II: INTERNET ATTACKS. Chapter 13: Understanding Internet--Based Attacks. Chapter 14: Different Types of Attacks. Chapter 15: Protecting Your System from Attack. Chapter 16: Protecting Your System in a P2P Environment. Chapter 17: Protecting a Network. Chapter 18: Choosing a Firewall. Chapter 19: Dealing with an Attack. PART III: PRIVACY THEFT. Chapter 20: Protecting Your Privacy. Chapter 21: Dealing with Online Fraud. Chapter 22: Protecting Yourself from Online Predators. Chapter 23: Defeating Spyware. Chapter 24: Managing Cookies. Chapter 25: Employing Passwords, Encryption, and Digital Identification. Chapter 26: How to SurfNand CommunicateNAnonymously. PART IV: E--MAIL SPAM. Chapter 27: Understanding Spam. Chapter 28: Dealing with Spam. Chapter 29: Dealing with Other Unwanted E--mails. PART V: WEB--BASED INTRUSIONS. Chapter 30: Dealing with Unwanted Ads and Pop--Ups. Chapter 31: Dealing with Inappropriate Content. Glossary. Index.
Erscheint lt. Verlag | 8.8.2002 |
---|---|
Zusatzinfo | illustrations |
Verlagsort | New York |
Sprache | englisch |
Maße | 191 x 229 mm |
Gewicht | 906 g |
Einbandart | Paperback |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Theorie / Studium ► Kryptologie | |
Informatik ► Weitere Themen ► Hardware | |
ISBN-10 | 0-7821-4127-7 / 0782141277 |
ISBN-13 | 978-0-7821-4127-6 / 9780782141276 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich