Home networking security simplified: [a straightforward, graphic-based reference for securing your home network]
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Indianapolis, Ind.
Cisco Press
2007
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Inhaltsverzeichnis Inhaltsverzeichnis |
Beschreibung: | XVIII, 206 S. Ill. graph. Darst. |
ISBN: | 1587201631 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035723482 | ||
003 | DE-604 | ||
005 | 20091110 | ||
007 | t | ||
008 | 090914s2007 ad|| |||| 00||| eng d | ||
020 | |a 1587201631 |9 1-587-20163-1 | ||
035 | |a (OCoLC)255195413 | ||
035 | |a (DE-599)GBV515185019 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-634 | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Doherty, Jim |e Verfasser |0 (DE-588)136542662 |4 aut | |
245 | 1 | 0 | |a Home networking security simplified |b [a straightforward, graphic-based reference for securing your home network] |c Jim Doherty ; Neil Anderson |
264 | 1 | |a Indianapolis, Ind. |b Cisco Press |c 2007 | |
300 | |a XVIII, 206 S. |b Ill. graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | |a Home computer networks / Security measures | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Anderson, Neil T. |d 1942- |e Verfasser |0 (DE-588)113241526 |4 aut | |
856 | 4 | |m DE-601 |q pdf/application |u http://www.gbv.de/dms/bowker/toc/9781587201639.pdf |3 Inhaltsverzeichnis | |
856 | 4 | |u http://www.loc.gov/catdir/toc/ecip0615/2006019633.html |z lizenzfrei |3 Inhaltsverzeichnis | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018000210&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-018000210 |
Datensatz im Suchindex
_version_ | 1804139998279106560 |
---|---|
adam_text | IMAGE 1
INTRODUCTION
P. XIV
TIP 1: USE FIREWALLS
P. 1
WHY DO I NEED FIREWALLS?
P. 3
HOW FIREWALLS WORK
P. 5
STATEFUL PACKET INSPECTION FIREWALLS
P. 5
PERSONAL SOFTWARE FIREWALLS
P. 6
PUTTING FIREWALLS TO WORK
P. 7
PUTTING A FIREWALL BETWEEN YOU AND THE INTERNET
P. 8
ROUTERS WITH A BUILT-IN FIREWALL
P. 8
DEDICATED FIREWALL DEVICES
P. 9
ENABLING PERSONAL FIREWALLS ON YOUR COMPUTERS
P. 10
WINDOWS XP BUILT-IN FIREWALL
P. 10
ZONEALARM PERSONAL SOFTWARE FIREWALL
P. 12
PERSONAL SOFTWARE FIREWALLS FOR PURCHASE
P. 16
TEST DRIVING YOUR NEW PROTECTION
P. 18
WHAT TO DO IF YOU THINK YOU VE BEEN HACKED
P. 20
SOMETIMES, FIREWALLS BLOCK THE GOOD STUFF
P. 22
SUMMARY
P. 22
WHERE TO GO FOR MORE INFORMATION
P. 22
TIP 2: SECURE YOUR WIRELESS NETWORK
P. 23
WHY SHOULD I CARE ABOUT WIRELESS NETWORK SECURITY?
P. 25
WHAT DO I DO ABOUT WIRELESS SECURITY?
P. 26
CHANGE YOUR PASSWORD
P. 27
DO NOT ADVERTISE YOUR WIRELESS NETWORK
P. 28
SCRAMBLE YOUR SIGNAL
P. 28
DISABLE AD-HOC NETWORKING
P. 31
HOW TO DO IT: SECURING YOUR WIRELESS NETWORK
P. 31
CHANGE THE ROUTER S DEFAULT PASSWORD
P. 31
STOP ADVERTISING YOUR WIRELESS NETWORK
P. 32
ENABLE WIRELESS ENCRYPTION
P. 33
ENABLING WEP ENCRYPTIONON THE WIRELESS ROUTER
P. 33
ENABLING WEP ENCRYPTION ON THE WIRELESS NIC
P. 35
WPA ENCRYPTION EXAMPLE
P. 44
DISABLE AD-HOC NETWORKING
P. 48
PREVENT UNINTENTIONAL ROAMING
P. 50
WIRELESS SECURITY CHECKLIST
P. 50
SUMMARY
P. 51
WHERE TO GO FOR MORE INFORMATION
P. 52
TIP 3: USE ANTIVIRUS PROTECTION
P. 53
WHAT ARE COMPUTER VIRUSES?
P. 55
VIRUSES
P. 55
IMAGE 2
WORMS
P. 56
TROJAN HORSES
P. 57
COMMONSENSE APPROACH TO COMPUTER VIRUSES
P. 58
HOW ANTIVIRUS WORKS
P. 59
VIRUS DETECTION
P. 60
VIRUS PREVENTION
P. 60
INOCULATING YOURSELF AGAINST COMPUTER VIRUSES
P. 61
TURNING ON ANTIVIRUS AT YOUR ISP
P. 62
INSTALLING ANTIVIRUS SOFTWARE ON YOUR COMPUTERS
P. 63
SCANNING YOUR COMPUTER FOR VIRUSES
P. 65
BLOCKING NEW VIRUS INFECTIONS
P. 67
ENABLING UNKNOWN VIRUS DETECTION (HEURISTICS)
P. 67
UPDATING YOUR VIRUS SIGNATURES
P. 69
WINDOWS LIVE ONECARE
P. 70
WHAT TO DO IF YOU THINK YOU VE BEEN INFECTED
P. 72
SUMMARY
P. 74
WHERE TO GO FOR MORE INFORMATION
P. 75
TIP 4: KEEP YOUR SOFTWARE UPDATED
P. 77
WHY SOFTWARE NEEDS TO BE UPDATED
P. 79
UPDATING YOUR OPERATING SYSTEM
P. 79
ENABLING AUTOMATIC UPDATES
P. 80
MANUAL OPERATING SYSTEM UPDATES
P. 82
UPDATING YOUR SOFTWARE PROGRAMS
P. 83
USING WINDOWS RESTORE POINTS
P. 85
CREATING A RESTORE POINT
P. 86
RESTORING YOUR COMPUTER TO A RESTORE POINT
P. 88
WHAT TO DO IF YOU THINK YOUR OPERATING SYSTEM HAS BEEN COMPROMISED P. 90
SUMMARY
P. 92
WHERE TO GO FOR MORE INFORMATION
P. 93
TIP 5: LOCK OUT SPYWARE AND ADWARE
P. 95
WHAT IS SPYWARE AND ADWARE?
P. 97
ADWARE
P. 97
SPYWARE
P. 98
ARE SPYWARE AND ADWARE VIRUSES?
P. 99
PREVENTING SPYWARE AND ADWARE
P. 99
EXERCISING COMMON SENSE
P. 100
INSTALLING A POPUP BLOCKER
P. 100
TURNING ON THE INTERNET EXPLORER BUILT-IN POPUP BLOCKER
P. 100
INSTALLING A THIRD-PARTY POPUP BLOCKER PROGRAM
P. 100
INSTALLING AN ANTISPYWARE/ANTIADWARE PROGRAM
P. 102
FREE ANTISPYWARE/ANTIADWARE PROGRAMS
P. 103
IMAGE 3
WINDOWS DEFENDER
P. 108
ANTISPYWARE/ANTIADWARE IN THE SECURITY BUNDLES
P. 112
WHAT TO DO IF YOU THINK YOU VE BEEN INFECTED
P. 113
SPYWARE/ADWARE-REMOVAL TOOLS
P. 113
REMOVING SPYWARE AND ADWARE PROGRAMS USING THE INSTALLED PROGRAMS LIST
P. 114
SUMMARY
P. 115
WHERE TO GO FOR MORE INFORMATION
P. 115
TIP 6: KEEP AN EYE ON YOUR KIDS
P. 117
WHAT ARE THE DANGERS YOUR KIDS MIGHT ENCOUNTER ONLINE?
P. 119
PORNOGRAPHY
P. 119
PREDATORS
P. 119
GAMBLING
P. 119
HACKING
P. 120
ILLEGAL PEER-TO-PEER SHARING
P. 120
MAYBE I SHOULD RETHINK THIS INTERNET THING
P. 120
PREPARING KIDS FOR BEING ONLINE
P. 121
ESTABLISH AND COMMUNICATE THE INTERNET USAGE POLICY
P. 121
MAKING KIDS AWARE OF ONLINE DANGERS
P. 122
AVOID GIVING OUT PERSONAL INFORMATION ONLINE
P. 123
POLICING KIDS ONLINE
P. 123
BROWSE IN PLAIN SIGHT
P. 123
MONITOR AND REVIEW YOUR KIDS WEBSITES AND BLOGS
P. 124
CHECK OUT YOUR KIDS BLOGS
P. 125
REVIEW WEBSITE HISTORY
P. 126
USING PARENTAL CONTROLS
P. 127
PARENTAL CONTROLS AT YOUR ISP
P. 128
PARENTAL CONTROLS AT YOUR HOME NETWORK ROUTER
P. 130
PARENTAL CONTROLS ON YOUR COMPUTERS
P. 134
WHAT TO DO IF YOU THINK YOUR CHILD IS ABUSING THE RULES
P. 138
ACTIVITY LOGGERS
P. 138
SUMMARY
P. 142
WHERE TO GO FOR MORE INFORMATION
P. 142
TIP 7: RECOGNIZE AND AVOID PHISHING SCAMS
P. 143
HOW PHISHING SCAMS WORK
P. 146
TRICKS OF THE TRADE
P. 146
HOW TO AVOID BECOMING A VICTIM
P. 149
WHAT TO DO IF YOU SUSPECT YOU ARE THE TARGET OF A PHISHING SCAM P. 153
SUMMARY
P. 154
WHERE TO GO FOR MORE INFORMATION
P. 154
TIP 8: CREATE STRONG PASSWORDS
P. 155
ANATOMY OF A LOUSY PASSWORD
P. 157
IMAGE 4
ELEMENTS OF A STRONG PASSWORD
P. 159
HOW TO CREATE A STRONG PASSWORD THAT YOU CAN REMEMBER P. 159
ADDITIONAL PASSWORD TIPS
P. 160
SUMMARY
P. 161
WHERE TO GO FOR MORE INFORMATION
P. 162
TIP 9: BACK UP YOUR FILES
P. 163
WHAT SHOULD I BACK UP?
P. 165
WHERE DO I BACK UP TO?
P. 166
HOW OFTEN SHOULD I BACK UP?
P. 166
STORAGE METHOD OVERVIEW
P. 167
FLASH MEMORY
P. 167
EXTERNAL HARD DRIVES
P. 168
NETWORKED STORAGE
P. 169
ONLINE STORAGE
P. 170
DVD OR CD STORAGE
P. 173
SUMMARY OF STORAGE OPTIONS
P. 174
PUTTING IT ALL TOGETHER
P. 175
USING WINDOWS XP BACKUP
P. 176
SUMMARY
P. 177
WHERE TO GO FOR MORE INFORMATION
P. 177
TIP 10: USE COMMON SENSE
P. 179
URBAN LEGENDS
P. 182
E-MAIL STOCK TIPS (PUMP-AND-DUMP SCAMS)
P. 182
WORK FROM HOME (PYRAMID) SCHEMES
P. 183
MONEY-EXCHANGE SCHEMES
P. 183
HOT MERCHANDISE SCAM
P. 184
WHAT TO DO TO PROTECT YOURSELF
P. 184
SUMMARY
P. 185
WHERE TO GO FOR MORE INFORMATION
P. 185
THEY COULDN T HIT AN ELEPHANT AT THIS DISTANCE
P. 187
GLOSSARY
P. 191
INDEX
P. 201
TABLE OF CONTENTS PROVIDED BY BLACKWELL S BOOK SERVICES AND R.R. BOWKER.
USED WITH PERMISSION.
|
any_adam_object | 1 |
author | Doherty, Jim Anderson, Neil T. 1942- |
author_GND | (DE-588)136542662 (DE-588)113241526 |
author_facet | Doherty, Jim Anderson, Neil T. 1942- |
author_role | aut aut |
author_sort | Doherty, Jim |
author_variant | j d jd n t a nt nta |
building | Verbundindex |
bvnumber | BV035723482 |
ctrlnum | (OCoLC)255195413 (DE-599)GBV515185019 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01696nam a2200385 c 4500</leader><controlfield tag="001">BV035723482</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20091110 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090914s2007 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1587201631</subfield><subfield code="9">1-587-20163-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)255195413</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV515185019</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Doherty, Jim</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)136542662</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Home networking security simplified</subfield><subfield code="b">[a straightforward, graphic-based reference for securing your home network]</subfield><subfield code="c">Jim Doherty ; Neil Anderson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">Cisco Press</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVIII, 206 S.</subfield><subfield code="b">Ill. graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Home computer networks / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Anderson, Neil T.</subfield><subfield code="d">1942-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)113241526</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="m">DE-601</subfield><subfield code="q">pdf/application</subfield><subfield code="u">http://www.gbv.de/dms/bowker/toc/9781587201639.pdf</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/ecip0615/2006019633.html</subfield><subfield code="z">lizenzfrei</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018000210&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018000210</subfield></datafield></record></collection> |
id | DE-604.BV035723482 |
illustrated | Illustrated |
indexdate | 2024-07-09T21:52:59Z |
institution | BVB |
isbn | 1587201631 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018000210 |
oclc_num | 255195413 |
open_access_boolean | |
owner | DE-634 |
owner_facet | DE-634 |
physical | XVIII, 206 S. Ill. graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Cisco Press |
record_format | marc |
spelling | Doherty, Jim Verfasser (DE-588)136542662 aut Home networking security simplified [a straightforward, graphic-based reference for securing your home network] Jim Doherty ; Neil Anderson Indianapolis, Ind. Cisco Press 2007 XVIII, 206 S. Ill. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Home computer networks / Security measures Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s DE-604 Anderson, Neil T. 1942- Verfasser (DE-588)113241526 aut DE-601 pdf/application http://www.gbv.de/dms/bowker/toc/9781587201639.pdf Inhaltsverzeichnis http://www.loc.gov/catdir/toc/ecip0615/2006019633.html lizenzfrei Inhaltsverzeichnis GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018000210&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Doherty, Jim Anderson, Neil T. 1942- Home networking security simplified [a straightforward, graphic-based reference for securing your home network] Home computer networks / Security measures Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4070085-9 |
title | Home networking security simplified [a straightforward, graphic-based reference for securing your home network] |
title_auth | Home networking security simplified [a straightforward, graphic-based reference for securing your home network] |
title_exact_search | Home networking security simplified [a straightforward, graphic-based reference for securing your home network] |
title_full | Home networking security simplified [a straightforward, graphic-based reference for securing your home network] Jim Doherty ; Neil Anderson |
title_fullStr | Home networking security simplified [a straightforward, graphic-based reference for securing your home network] Jim Doherty ; Neil Anderson |
title_full_unstemmed | Home networking security simplified [a straightforward, graphic-based reference for securing your home network] Jim Doherty ; Neil Anderson |
title_short | Home networking security simplified |
title_sort | home networking security simplified a straightforward graphic based reference for securing your home network |
title_sub | [a straightforward, graphic-based reference for securing your home network] |
topic | Home computer networks / Security measures Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Home computer networks / Security measures Computersicherheit Rechnernetz |
url | http://www.gbv.de/dms/bowker/toc/9781587201639.pdf http://www.loc.gov/catdir/toc/ecip0615/2006019633.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018000210&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT dohertyjim homenetworkingsecuritysimplifiedastraightforwardgraphicbasedreferenceforsecuringyourhomenetwork AT andersonneilt homenetworkingsecuritysimplifiedastraightforwardgraphicbasedreferenceforsecuringyourhomenetwork |
Es ist kein Print-Exemplar vorhanden.
Inhaltsverzeichnis
Inhaltsverzeichnis