O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

Book Description

Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.

Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Security is a source of jargon-less advice everyone needs to operate their computer securely.

* Written in easy to understand non-technical language that novices can comprehend

* Provides detailed coverage of the essential security subjects that everyone needs to know

* Covers just enough information to educate without being overwhelming

Table of Contents

  1. Cover
  2. Title Page
  3. Acknowledgments
  4. Dedication
  5. Author Acknowledgments
  6. Lead Author
  7. Contributing Authors
  8. Technical Editor
  9. Foreword
  10. Table of Contents
  11. Introduction
  12. Part I: Bare Essentials
    1. Chapter 1: Basic Windows Security
      1. Introduction
      2. Why Do You Need to Be Secure?
      3. Why Are You at Risk?
      4. Summary
      5. Additional Resources
    2. Chapter 2: Passwords
      1. Introduction
      2. Password Power
      3. Password Cracking
      4. Storing Your Passwords
      5. One Super-Powerful Password
      6. Summary
      7. Additional Resources
    3. Chapter 3: Viruses, Worms, and Other Malware
      1. Introduction
      2. Malware Terms
      3. The History of Malware
      4. Summary
      5. Additional Resources
    4. Chapter 4: Patching
      1. Introduction
      2. Patch Terminology
      3. Why Should I Patch?
      4. How Do I Know What to Patch?
      5. Summary
      6. Additional Resources
  13. Part II: More Essential Security
    1. Chapter 5: Perimeter Security
      1. Introduction
      2. From Moats and Bridges to Firewalls and Filters
      3. Firewalls
      4. Intrusion Detection and Prevention
      5. Summary
      6. Additional Resources
    2. Chapter 6: E-mail Safety
      1. Introduction
      2. The Evolution of E-mail
      3. E-mail Security Concerns
      4. Summary
      5. Additional Resources
    3. Chapter 7: Web Surfing Privacy and Safety
      1. Introduction
      2. The Revolutionary World Wide Web
      3. Web Security Concerns
      4. Summary
      5. Additional Resources
    4. Chapter 8: Wireless Network Security
      1. Introduction
      2. The Basics of Wireless Networks
      3. Basic Wireless Network Security Measures
      4. Additional Hotspot Security Measures
      5. Summary
      6. Additional Resources
    5. Chapter 9: Spyware and Adware
      1. Introduction
      2. What Is Adware?
      3. What Is Spyware?
      4. Getting Rid of Spyware
      5. Summary
      6. Additional Resources
  14. Part III: Testing and Maintenance
    1. Chapter 10: Keeping Things Secure
      1. Introduction
      2. General PC Maintenance
      3. Patches and Updates
      4. Windows XP Security Center
      5. Summary
      6. Additional Resources
    2. Chapter 11: When Disaster Strikes
      1. Introduction
      2. Check the Event Logs
      3. Enable Security Auditing
      4. Review Your Firewall Logs
      5. Scan Your Computer
      6. Restore Your System
      7. Start from Scratch
      8. Restore Your Data
      9. Call In the Pros
      10. Summary
      11. Additional Resources
    3. Chapter 12: Microsoft Alternatives
      1. Introduction
      2. Common Desktop Environments
      3. The X Window System and Window Managers
      4. E-mail and Personal Information Management Clients
      5. Web Browsers
      6. Office Application Suites
      7. Running Windows Applications on Linux
      8. Summary
      9. Additional Resources
  15. Part IV: Security Resources
    1. Appendix A: Essential Network Communications
      1. Introduction
      2. Computer Protocols
      3. Communication Ports
      4. TCP and UDP Protocols
      5. Understanding IP Addresses and DNS
      6. Managing IP Addresses
      7. Firewalls
    2. Appendix B: Case Study
      1. Introduction
      2. Employing a Firewall in a SOHO Environment
      3. Introducing the SOHO Firewall Case Study
      4. Designing the SOHO Firewall
      5. Summary
      6. Solutions Fast Track
      7. Frequently Asked Questions
    3. Appendix C: Glossary of Technology and Terminology
  16. Index
  17. Instructions for online access