Skip to Main Content
For enterprise
For government
For higher ed
For individuals
For Content Marketing
For enterprise
For government
For higher ed
For individuals
For Content Marketing
Explore Skills
Cloud Computing
Microsoft Azure
Amazon Web Services (AWS)
Google Cloud
Cloud Migration
Cloud Deployment
Cloud Platforms
Data Engineering
Data Warehouse
SQL
Apache Spark
Microsoft SQL Server
MySQL
Kafka
Data Lake
Streaming & Messaging
NoSQL Databases
Relational Databases
Data Science
AI & ML
Generative AI
Machine Learning
Artificial Intelligence (AI)
Deep Learning
Reinforcement Learning
Natural Language Processing
TensorFlow
Scikit-Learn
Hyperparameter Tuning
MLOps
Programming Languages
Java
JavaScript
Spring
Python
Go
C#
C++
C
Swift
Rust
Functional Programming
Software Architecture
Object-Oriented
Distributed Systems
Domain-Driven Design
Architectural Patterns
IT/Ops
Security
Network Security
Application Security
Incident Response
Zero Trust Model
Disaster Recovery
Penetration Testing / Ethical Hacking
Governance
Malware
Security Architecture
Security Engineering
Security Certifications
Design
Web Design
Graphic Design
Interaction Design
Film & Video
User Experience (UX)
Design Process
Design Tools
Business
Agile
Project Management
Product Management
Marketing
Human Resources
Finance
Team Management
Business Strategy
Digital Transformation
Organizational Leadership
Soft Skills
Professional Communication
Emotional Intelligence
Presentation Skills
Innovation
Critical Thinking
Public Speaking
Collaboration
Personal Productivity
Confidence / Motivation
Features
All features
AI Academy
Courses
Certifications
Interactive learning
Live events
Answers
Insights reporting
Radar Blog
Buy Courses
Plans
Sign In
Try Now
O'Reilly Platform
book
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
by
T. Bradley
November 2006
Beginner content level
Beginner
279 pages
7h 17m
English
Syngress
Content preview from
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
Index
802.11x wireless protocols,
126–127
A
access
restricting to home wireless network,
130–131
Windows, levels and permissions,
18–21
accounts
Guest, disabling in Windows XP,
11–12
user.
See
user accounts
Acrobat Reader,
208–209
active scripting and Web surfing,
112–115
ActiveX controls,
106
Ad-aware,
145
,
146
,
147–148
addresses
IP.
See
IP addresses
MAC,
130–131
spoofed e-mail,
92–93
Administrator account
securing home system,
128–129
Windows XP,
9–13
Adobe Acrobat Reader,
208–209
advertising
See also
spam, spyware
adware,
140–144
,
150
Aethera e-mail (Linux),
193–194
AfterSTEP window manager,
187
AirSnarf,
134
Amazon.com,
107
antivirus software
using,
44–47
for wireless networks,
133
application gateways,
74
applications
in desktop environments ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial
You might also like
Network Security First-Step, Second Edition
Thomas M. Thomas, Donald Stoddard
Wireless and Mobile Device Security
Jim Doherty
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Peter Thermos, Ari Takanen
Email Security: A Pocket Guide
Steven Furnell, Paul Dowland
Publisher Resources
ISBN: 9781597491143