O'Reilly logo

CompTIA A+ Certification All-in-One Exam Guide, Ninth Edition (Exams 220-901 & 220-902), 9th Edition by Mike Meyers

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 28

Securing Computers

In this chapter, you will learn how to

•   Explain the threats to your computers and data

•   Describe key security concepts and technologies

•   Explain how to protect computers from network threats

Your PC is under siege. Through your PC, a malicious person can gain valuable information about you and your habits. He can steal your files. He can run programs that log your keystrokes and thus gain account names and passwords, credit card information, and more. He can run software that takes over much of your computer processing time and use it to send spam or steal from others. The threat is real and immediate. Worse, he’s doing one or more of these things to your clients as I write these words. You need to secure ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required