138 records matched your query
08192cam a22004454a 4500 001 2986A33A2B0D11DE82774608A8D7520A 003 SILO 005 20090730151221 008 060224s2006 maua b 001 0 eng 010 $a 2006006796 020 $a 9781584504863 (pbk. with cd-rom : alk. paper) 020 $a 1584504862 (pbk. with cd-rom : alk. paper) 040 $a DLC $c DLC $d SILO $d C#P $d BTCTA $d YDXCP $d CS1 $d LMR $d CRH $d TBS $d NOR $d IOG $d SILO 042 $a pcc 050 00 $a QA76.9.A25 $b B37734 2006 082 00 $a 005.8 $2 22 100 1 $a Barile, Ian. 245 1 $a Protecting your PC / $c Ian Barile. 250 $a 1st ed. 260 $a Boston, Mass. : $b Charles River Meida, $c 2006. 300 $a xix, 364 p. : $b ill. ; $c 24 cm. $e + 1 CD-ROM (4 3/4 in.) 440 0 $a Charles River Media general computing series 504 $a Includes bibliographical references and index. 505 00 $t Summary -- $g 2. $t Getting started -- $g 1. The $t what's and why's of computer security? -- $t Computer security -- $t How do you make computers secure? -- $t Why do you need to protect your computer? -- $t What are you protecting yourself against? -- $t What happens when you don't protect your computer -- $t Summary -- $g 2. $t Where are you at? -- $t Your level of experience -- $t How do you use your computer? -- $t How secure are you? -- $t Summary -- 505 00 $g The $t Summary -- $g 3. $t Viruses, worms, and Trojans -- $t What is a computer virus? -- $t Worms -- $t Trojans -- $t Other categories of malicious code -- $t How do you get infected? -- $t Are you infected? -- $t Is your email infected with a virus? -- $t Antibiotics and vaccines for computers -- $t Where antivirus software doesn't protect you -- $t Hoaxes, the joke is on you -- $t Additional information -- $t Summary -- $g 4. $t Stopping those pesky pop-ups, putting an end to spyware -- $g A $t run in with adware and spyware -- $t Why it's good to be in the "know" -- $t Where is that pop-up ad coming from? -- $t Spyware, is someone watching me? -- $t Adware, spyware, and Internet Explorer -- $t Other nasty applications -- $t How did the adware and spyware get on my computer? -- $g The $t effects of adware and spyware -- $t Are you being spied on? -- $t Additional information -- $t Summary -- 505 00 $g 7. $t Summary -- $g 5. $t Getting to the Internet, Internet service providers (ISPs) -- $t What type of connection is right for you? -- $t How computers talk with one another -- $t ISPs and your privacy -- $t Finding the right ISP -- $t What do the numbers mean? -- $t Additional information -- $t Summary -- $g 6. $t Stopping the hacker onslaught -- $t What is a firewall? -- $t Is your computer a honey pot? -- $t Why you should use a hardware firewall -- $t Hardware firewalls -- $t Choosing a broadband router -- $t Why use a personal firewall? -- $t Where do you get a personal firewall? -- $t Security features of Norton Internet security personal firewall -- $t Windows firewall for Windows XP Service Pack 2 -- $t Security scans -- $t Testing your firewall for leaks -- $t Summary -- $g 7. $t Going wireless -- $t Wireless LANs -- $t Making sense of 802.11 protocols -- $t Planning on going wireless? -- $t You've already gone wireless -- $t It's important to secure that wireless LAN -- $t Securing your wireless router -- $t Bluetooth -- $t Additional information -- $t Summary -- 505 00 $g 12. $t Summary -- $g 8. $t Untangling the Web -- $t Web browsers -- $g The $t Web at work -- $t Secure connections -- $t How does that web server know who I am? -- $t Good tools that go bad -- $t Web anonymizers -- $t Browser security tests -- $t Summary -- $g 9. $t Locking down Internet Explorer -- $t Patch Internet Explorer -- $t Finding the security options -- $t Cleaning temporary files and history -- $t Security zones -- $t Cookies -- $t Trusted publishers -- $t Internet Explorer's secure connection settings -- $t Advanced options -- $t Windows XP Service Pack 2 for Internet Explorer -- $t Summary -- $g 10. Shopping and banking online -- $t It is safe to bank online -- $t Trading online -- $t Paying bills online -- $t Bill management -- $t Online shopping -- $t Online auctions -- $t Taxes -- $t Fraud -- $t Summary -- $g 11. $t E-mail, how private is it? -- $t Who owns your email? -- $t Email and the government -- $t Personal email accounts -- $t Signing up for a personal account -- $t Company email accounts -- $t I didn't want that in my inbox -- $t Email and your electronic mailman -- $t Intercepting email -- $t Carnivore -- $t Securing your email -- $t Digital signatures -- $t Summary -- $g 12. $t Spam, it's not canned ham -- $t Why span is bad -- $t Why spammers spam -- $t History of spam -- $t Different types of spam -- $t Opting out of spam ; it doesn't work -- $t Laws of spam -- $t Fighting spam -- $t How spammers find you -- $t How antispam tools work -- $t Norton antispam -- $t Summary -- 505 00 $g 15. The $t Summary -- $t Phishing emails are a regular occurrence -- $t What type of information are phishers phishing for? -- $t Types of phishing emails -- $t Is that email legit? -- $t Cross-site scripting -- $t Phishing and blogs -- $t Phishing, voice over IP and faking caller ID -- $t Who runs phishing scams? -- $t Pharming -- $t Spam filters and phishing -- $t Phishing and security suites -- $t Additional information -- $t Summary -- $g 14. $t Securing your email client -- $t Why you want to secure your email client -- $t Types of email clients -- $t Application email clients -- $t Web based email clients -- $t Tools that protect email clients -- $t Summary -- $g 15. The $t do's and don'ts of instant messaging and chat rooms -- $t What is instant messaging? -- $t Why instant message? -- $t Choosing an instant messaging service -- $t Protecting yourself when you're instant messaging -- $t What are chat rooms? -- $t Where to chat? -- $t Chatting safely -- $t Is your favorite chat service a safe place to chat? -- $t Chatting tips for kids -- $t Summary -- 505 00 $g The $t Summary -- $g 16. $t Filing the holes, system and application patching -- $t Software and bugs -- $t Vulnerabilities -- $t End user license agreements (EULA) -- $t You need to fix recalled software, apply the update -- $t Microsoft and security vulnerabilities -- $t Updating Windows -- $t Updating Microsoft Office -- $t Update your antivirus software's virus definitions -- $t Update your personal firewall -- $t Update your instant messaging software -- $t Update the BIOS -- $t Update device drivers -- $t Summary -- $g 17. $t Saving yourself from the delete key -- $t Deleting a file -- $t What happens when a file is deleted -- $g The $t importance of backing up files -- $t Backup strategies -- $t Making sure the delete key deletes the file -- $t Summary -- 505 00 $g 20. $t Index. $g 18. $t Passwords -- $t Identification, authentication, authorization, and access control -- $t Why you need to choose a good password -- $t Choosing a good password -- $g The $t security of a sticky note -- $t When and how passwords fail -- $g The $t importance of changing your password -- $t Reusing passwords is a bad idea -- $t Universal passwords -- $t Software that fills in passwords on Web form -- $t Authentication systems -- $t Summary -- $g 19. $t Protecting your privacy, personal and confidential information -- $t Your privacy -- $t Personal and confidential information -- $t Summary -- $g 20. $t Kids, computers, and the Internet -- $t Kids and computers -- $t Make using a computer a family experience -- $t Leaving the house through the Internet -- $t Is your child at risk? -- $t Rules for computer safety -- $t Laws that protect children -- $t Parental control software -- $t Summary -- $t Appendix A : Web resources -- $t General computer news -- $t Windows security -- $t Computer viruses -- $t General computer security -- $t Browser security -- $t Identity theft -- $t Spam -- $t Phishing -- $t Updating the Windows operation system -- $t Appendix B : Security checklists -- $t Appendix C : The law, computers, and you -- $t Copyrights -- $t Hacking and tampering -- $t Privacy -- $t Additional information -- $t Appendix D : About the CD-ROM -- $t Index. 650 0 $a Computer security. 650 0 $a Computer networks $x Security measures. 856 41 $3 Table of contents only $u http://www.loc.gov/catdir/toc/ecip069/2006006796.html 941 $a 4 952 $l PYAX423 $d 20180718043251.0 952 $l GDPF771 $d 20170418053731.0 952 $l UNUX074 $d 20090701080000.0 952 $l OIAX792 $d 20090708133753.0 956 $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=2986A33A2B0D11DE82774608A8D7520A 994 $a 02 $b IOGInitiate Another SILO Locator Search