Computer Security for the Home and Small Office
Seiten
2004
|
Softcover reprint of the original 1st ed.
Apress (Verlag)
978-1-59059-316-5 (ISBN)
Apress (Verlag)
978-1-59059-316-5 (ISBN)
Computer Security for the Home and Small Office addresses the long-neglected security needs of everyday users in the home, company workstation, and SOHO (small office/home office) categories, with emphasis on system hardening, eliminating malware, user and Internet privacy, encryption, and data hygiene.
The book offers comprehensive tutorials for protecting privacy, preventing system attacks and, most important, avoiding difficulties from buggy programs and software laced with hidden functions and networking capabilities.
Furthermore, the book is packed with information about open-source products with related security strategies for Windows users. One recurrent strategy: replacing insecure closed-source applications and utilities with safer open-source alternatives, thereby eliminating numerous routes to system exploitation and privacy invasion.
Also included is plenty of guidance for Linux users, and a full chapter weighing the advantages and disadvantages of migrating to Linux—a step that can greatly simplify computer security, even for the novice user.
The book offers comprehensive tutorials for protecting privacy, preventing system attacks and, most important, avoiding difficulties from buggy programs and software laced with hidden functions and networking capabilities.
Furthermore, the book is packed with information about open-source products with related security strategies for Windows users. One recurrent strategy: replacing insecure closed-source applications and utilities with safer open-source alternatives, thereby eliminating numerous routes to system exploitation and privacy invasion.
Also included is plenty of guidance for Linux users, and a full chapter weighing the advantages and disadvantages of migrating to Linux—a step that can greatly simplify computer security, even for the novice user.
Thomas C. Greene is associate editor of The Register, the leading independent IT news daily, where he has been a senior editor and columnist for 5 years. Tom covers cybercrime, computer and network security, and Washington politics and legislation related to information technology.
1 Introducing the Dark Side.- 2 Vectors.- 3 Social Engineering.- 4 From Newbie to Power User.- 5 Treasure Hunt.- 6 The Open-Source Escape Hatch.- 7 Trust Nothing, Fear Nothing.- Appendix A Glossary.- Appendix B Procedures, Processes, and Ports.- Procedures.- Notes on NAT.- Notes on Packet Filters.- Windows Processes.- Ports.- Appendix C Online Resources.- Security News.- Resources.- E-mail Lists.
Zusatzinfo | XLI, 406 p. |
---|---|
Verlagsort | Berkley |
Sprache | englisch |
Maße | 191 x 229 mm |
Themenwelt | Mathematik / Informatik ► Informatik ► Betriebssysteme / Server |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Mathematik / Informatik ► Informatik ► Software Entwicklung | |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | Computersicherheit |
ISBN-10 | 1-59059-316-2 / 1590593162 |
ISBN-13 | 978-1-59059-316-5 / 9781590593165 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
eine Cyberstaatsanwältin ermittelt
Buch | Hardcover (2024)
Murmann Publishers (Verlag)
25,00 €