Absolute PC Security and Privacy - Michael Miller

Absolute PC Security and Privacy

Defend Your Computer Against Outside Intruders

(Autor)

Buch | Softcover
530 Seiten
2002
Sybex Inc.,U.S. (Verlag)
978-0-7821-4127-6 (ISBN)
44,51 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Focusing on solving the major security and virus-related problems encountered by computer users, this is an end-user level book. It covers the various issues - such as viruses, security, and spam, and presents real-world solutions to the most common problems encountered by average users.
An end-user level book that focuses on solving the major security and virus-related problems encountered by computer users. Unlike other books that focus on a single aspect of the problem, this book covers all the important issues - such as viruses, security, and spam. And, while other books contain a lot of theory and background that may be of interest to a high-end user or network administrator, "Absolute PC Security" presents real-world solutions to the most common problems encountered by average users.

Michael Miller has authored more than three dozen non--fiction books in the past decade, including Sybex's Discovering P2P, Discovering Bluetooth, Mastering Word 2000 Premium Edition, and PowerPoint 2000! I Didn't Know You Could Do That. He has established a strong reputation for explaining technical information to non--technical readers, and for offering useful real--world advice about complicated topics. Mr. Miller is President of the Molehill Group, a writing/consulting firm based in Indiana.

Contents at a Glance. Introduction. PART I:COMPUTER VIRUSES. Chapter 1: Understanding Computer Viruses. Chapter 2: How to Catch a Virus. Chapter 3: Boot Sector and File Infector Viruses. Chapter 4: Macro Viruses. Chapter 5: Script Viruses. Chapter 6: Trojan Horses and Worms. Chapter 7: E--mail, Chat, and Instant Messaging Viruses. Chapter 8:Virus Hoaxes. Chapter 9: Antivirus Software and Services. Chapter 10: Identifying New Threats. Chapter 11: Preventing Virus Attacks. Chapter 12: Dealing with a Virus Attack. PART II: INTERNET ATTACKS. Chapter 13: Understanding Internet--Based Attacks. Chapter 14: Different Types of Attacks. Chapter 15: Protecting Your System from Attack. Chapter 16: Protecting Your System in a P2P Environment. Chapter 17: Protecting a Network. Chapter 18: Choosing a Firewall. Chapter 19: Dealing with an Attack. PART III: PRIVACY THEFT. Chapter 20: Protecting Your Privacy. Chapter 21: Dealing with Online Fraud. Chapter 22: Protecting Yourself from Online Predators. Chapter 23: Defeating Spyware. Chapter 24: Managing Cookies. Chapter 25: Employing Passwords, Encryption, and Digital Identification. Chapter 26: How to SurfNand CommunicateNAnonymously. PART IV: E--MAIL SPAM. Chapter 27: Understanding Spam. Chapter 28: Dealing with Spam. Chapter 29: Dealing with Other Unwanted E--mails. PART V: WEB--BASED INTRUSIONS. Chapter 30: Dealing with Unwanted Ads and Pop--Ups. Chapter 31: Dealing with Inappropriate Content. Glossary. Index.

Erscheint lt. Verlag 8.8.2002
Zusatzinfo illustrations
Verlagsort New York
Sprache englisch
Maße 191 x 229 mm
Gewicht 906 g
Einbandart Paperback
Themenwelt Mathematik / Informatik Informatik Netzwerke
Informatik Theorie / Studium Kryptologie
Informatik Weitere Themen Hardware
ISBN-10 0-7821-4127-7 / 0782141277
ISBN-13 978-0-7821-4127-6 / 9780782141276
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich