Protecting Your PC (Record no. 294376)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 07075nam a2200157Ia 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9788131502457 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 BAR-P |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Ian Barile |
245 ## - TITLE STATEMENT | |
Title | Protecting Your PC |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Boston, Mass |
Name of publisher, distributor, etc. | Charles River Media |
Date of publication, distribution, etc. | 2006 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xix, 364 pages : illustrations ; 24 cm |
490 ## - SERIES STATEMENT | |
Series statement | Charles River Media general computing series. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Introduction -- pt. 1. Getting started -- 1. The what's and why's of computer security? -- Computer security -- How do you make computers secure? -- Why do you need to protect your computer? -- What are you protecting yourself against? -- What happens when you don't protect your computer -- Summary -- 2. Where are you at? -- Your level of experience -- How do you use your computer? -- How secure are you? -- Summary. pt. 2. Malware -- 3. Viruses, worms, and Trojans -- What is a computer virus? -- Worms -- Trojans -- Other categories of malicious code -- How do you get infected? -- Are you infected? -- Is your email infected with a virus? -- Antibiotics and vaccines for computers -- Where antivirus software doesn't protect you -- Hoaxes, the joke is on you -- Additional information -- Summary -- 4. Stopping those pesky pop-ups, putting an end to spyware -- A run in with adware and spyware -- Why it's good to be in the "know" -- Where is that pop-up ad coming from? -- Spyware, is someone watching me? -- Adware, spyware, and Internet Explorer -- Other nasty applications -- How did the adware and spyware get on my computer? -- The effects of adware and spyware -- Are you being spied on? -- Additional information -- Summary. pt. 3. Networking in the home -- 5. Getting to the Internet, Internet service providers (ISPs) -- What type of connection is right for you? -- How computers talk with one another -- ISPs and your privacy -- Finding the right ISP -- What do the numbers mean? -- Additional information -- Summary -- 6. Stopping the hacker onslaught -- What is a firewall? -- Is your computer a honey pot? -- Why you should use a hardware firewall -- Hardware firewalls -- Choosing a broadband router -- Why use a personal firewall? -- Where do you get a personal firewall? -- Security features of Norton Internet security personal firewall -- Windows firewall for Windows XP Service Pack 2 -- Security scans -- Testing your firewall for leaks -- Summary -- 7. Going wireless -- Wireless LANs -- Making sense of 802.11 protocols -- Planning on going wireless? -- You've already gone wireless -- It's important to secure that wireless LAN -- Securing your wireless router -- Bluetooth -- Additional information -- Summary. pt. 4. The Internet -- 8. Untangling the Web -- Web browsers -- The Web at work -- Secure connections -- How does that web server know who I am? -- Good tools that go bad -- Web anonymizers -- Browser security tests -- Summary -- 9. Locking down Internet Explorer -- Patch Internet Explorer -- Finding the security options -- Cleaning temporary files and history -- Security zones -- Cookies -- Trusted publishers -- Internet Explorer's secure connection settings -- Advanced options -- Windows XP Service Pack 2 for Internet Explorer -- Summary -- 10. Shopping and banking online -- It is safe to bank online -- Trading online -- Paying bills online -- Bill management -- Online shopping -- Online auctions -- Taxes -- Fraud -- Summary -- 11. E-mail, how private is it? -- Who owns your email? -- Email and the government -- Personal email accounts -- Signing up for a personal account -- Company email accounts -- I didn't want that in my inbox -- Email and your electronic mailman -- Intercepting email -- Carnivore -- Securing your email -- Digital signatures -- Summary -- 12. Spam, it's not canned ham -- Why span is bad -- Why spammers spam -- History of spam -- Different types of spam -- Opting out of spam ; it doesn't work -- Laws of spam -- Fighting spam -- How spammers find you -- How antispam tools work -- Norton antispam -- Summary. 13. Phishing, don't give away your personal information -- Phishing emails are a regular occurrence -- What type of information are phishers phishing for? -- Types of phishing emails -- Is that email legit? -- Cross-site scripting -- Phishing and blogs -- Phishing, voice over IP and faking caller ID -- Who runs phishing scams? -- Pharming -- Spam filters and phishing -- Phishing and security suites -- Additional information -- Summary -- 14. Securing your email client -- Why you want to secure your email client -- Types of email clients -- Application email clients -- Web based email clients -- Tools that protect email clients -- Summary -- 15. The do's and don'ts of instant messaging and chat rooms -- What is instant messaging? -- Why instant message? -- Choosing an instant messaging service -- Protecting yourself when you're instant messaging -- What are chat rooms? -- Where to chat? -- Chatting safely -- Is your favorite chat service a safe place to chat? -- Chatting tips for kids -- Summary. pt. 5. System maintenance -- 16. Filing the holes, system and application patching -- Software and bugs -- Vulnerabilities -- End user license agreements (EULA) -- You need to fix recalled software, apply the update -- Microsoft and security vulnerabilities -- Updating Windows -- Updating Microsoft Office -- Update your antivirus software's virus definitions -- Update your personal firewall -- Update your instant messaging software -- Update the BIOS -- Update device drivers -- Summary -- 17. Saving yourself from the delete key -- Deleting a file -- What happens when a file is deleted -- The importance of backing up files -- Backup strategies -- Making sure the delete key deletes the file -- Summary. pt. 6. Protecting people and information -- 18. Passwords -- Identification, authentication, authorization, and access control -- Why you need to choose a good password -- Choosing a good password -- The security of a sticky note -- When and how passwords fail -- The importance of changing your password -- Reusing passwords is a bad idea -- Universal passwords -- Software that fills in passwords on Web form -- Authentication systems -- Summary -- 19. Protecting your privacy, personal and confidential information -- Your privacy -- Personal and confidential information -- Summary -- 20. Kids, computers, and the Internet -- Kids and computers -- Make using a computer a family experience -- Leaving the house through the Internet -- Is your child at risk? -- Rules for computer safety -- Laws that protect children -- Parental control software -- Summary -- Appendix A : Web resources -- General computer news -- Windows security -- Computer viruses -- General computer security -- Browser security -- Identity theft -- Spam -- Phishing -- Updating the Windows operation system -- Appendix B : Security checklists -- Appendix C : The law, computers, and you -- Copyrights -- Hacking and tampering -- Privacy -- Additional information -- Appendix D : About the CD-ROM -- Index. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. Computer networks -- Security measures. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Book |
Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dept. of Computational Biology and Bioinformatics | Dept. of Computational Biology and Bioinformatics | Processing Center | 01/09/2015 | 005.8 BAR-P | DCB992 | 01/09/2015 | 19/07/2019 | Book |