O'Reilly logo

Teach Yourself Visually™: Computers, 5th Edition by Paul McFedries

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 16. Implementing Computer Security

Implementing Computer Security

Threats to your computer-related security and privacy often come from the Internet in the form of system intruders, such as e-mail spam, viruses, and identity thieves. In addition, many security and privacy violations occur right at your computer by someone simply logging in to your computer while you are not around. To protect yourself and your family, you need to understand these threats and to know what you can do to thwart them.

Guard Against Internet Intruders 280

Protect Yourself on the Web 282

Protect Your Children on the Web 284

Reduce E-Mail Spam 286

Guard Against E-Mail Viruses 288

Enhance E-Mail Privacy ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required