How to stop e-mail spam, spyware, malware, computer viruses, and hackers from ruining your computer or network The complete guide for your home and work

Bruce C. Brown, 1965-

Book - 2011

Saved in:
Subjects
Published
Ocala, Fla. : Atlantic Pub. Group c2011.
Language
English
Main Author
Bruce C. Brown, 1965- (-)
Physical Description
288 p. : ill. ; 23 cm
Bibliography
Includes bibliographical references and index.
ISBN
9781601383037
  • Foreword
  • Introduction
  • Is This Book for Me?
  • How This Book is Organized
  • Chapter 1. Malware: A Comprehensive Introduction
  • Spyware
  • Adware
  • Viruses
  • Spam
  • Spoofing
  • Phishing
  • Worms
  • Trojans
  • SQL injection
  • Hijack
  • Rootkits
  • Bots
  • Impact of Malware
  • Chapter 2. Computer Viruses: Are You at Risk?
  • Types of Viruses
  • How Viruses Infect Computers
  • Capabilities of a Virus
  • Locations Where a Virus is Most Commonly Found
  • Impact of Viruses on Computer Operating Systems
  • Virus Removal Methods
  • Chapter 3. Antivirus Solutions & Defense
  • Chapter 4. Spam, Spoofing, Phishing, & E-Mail Hoaxes: What They Are and How to Block Them
  • Spoofing
  • Phishing
  • Whaling
  • Pharming
  • CAN-SPAM Act
  • Hoaxes
  • Spam Virus E-Mails
  • E-Mail Relaying
  • Spam Tools
  • The 10 Most Common E-mail Scams and How to Defend Against Them
  • Chapter 5. Detecting and Countering Malware & Spyware
  • Viruses
  • Worms
  • Trojan Horse
  • Rootkits
  • Adware
  • Crimeware
  • Grayware
  • Denial of Service Attack
  • Robots
  • SQL Injection Attack
  • Cross-Site Scripting (XSS)
  • Cross-Site Forgery Request
  • Relay Attack
  • Chapter 6. Web Browsers, Pop-Up Windows, & How to Surf the Web Safely
  • Web Browsers
  • Windows 7 Parental Controls
  • Chapter 7. Firewalls: A Comprehensive Introduction
  • Basics of Information Security
  • Internet Threats
  • What is a Firewall?
  • How do Firewalls Work?
  • Virtual Private Networks
  • Types of Firewalls
  • Firewalls: Home and Business Networks
  • An Introduction to Hardware and Software Firewall Products
  • Chapter 8. Hackers: How to Defend Against Hacks & Other Attacks
  • Methods Hackers Use to Attack
  • Why do People Hack?
  • Protections Against Hacking
  • Chapter 9. Network Security: How to Protect and Secure your Home or Small-business Network
  • Securing Your Home Network
  • Securing Your Business Network
  • Security in Windows XP Networks
  • Security in WindowsVista Networks
  • Security in Windows 7 Networks
  • How are Windows 7 Networking and Network Security Improved?
  • Hacking into a Network
  • Advanced Network Monitoring and Protection
  • Chapter 10. Wireless Network Security: How to Secure Your Wireless Network
  • Wireless PANs
  • Wireless LANs
  • Wireless WANs
  • Wireless Technologies
  • Wireless Security
  • Security of the Physical System
  • Privacy
  • Hacking a Wireless System
  • Securing Your Wireless System
  • Wireless Networking in Windows XP
  • Wireless Networking in Windows Vista
  • Wireless Networking in Windows 7
  • Chapter 11. Software Products to Protect Your Computers & Networks
  • Internet Security Suites
  • Antivirus Software
  • Antispyware Software
  • Antispam Software
  • Specialty Tools and Malware Protection
  • Personal Firewall Software
  • Network Monitoring Software
  • User Activity-Monitoring Software
  • Network Detection and Monitoring (Including Wireless)
  • Conclusion
  • Glossary
  • Author Biography
  • Bibliography
  • Index