Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Complete Idiot's Guide to Computer Security
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Complete Idiot's Guide to Computer Security

Complete Idiot's Guide to Computer Security

Richard MacDonald

416 pages, parution le 01/07/2002

Résumé

Worried about the safety of your precious computer data? Concerned that shadowy figures are tracking your online activities for their own evil purposes? Uncertain what you can do to combat hackers breaking into your system? Worry no more...
Straightforward and jargon-free, The Complete Idiot's Guide to Computer Security offers practical advice on how to secure your data and ensure your personal information is kept safe. The uncomplicated, step-by-step approach gives you the confidence and competence to implement a complete security strategy. In it you will learn how to take control of your hardware and software, how to reconfigure it to meet your personal needs and how to set up your web browsing to ensure total online privacy and much more.
The book includes:

  • Detailed explanations of the dangers to your computer
  • Illustrated, down-to-earth advice on setting up your system to ensure total security
  • Regular checklists to remind you of the steps you need to take
  • Copious web links to sites where you can download vital security software or seek further information.

Contents
  • Part 1: Know Your Enemy
  • 1 'Don't Buy A Computer, But...'
  • An overview of your computer and the threats it faces.
  • 2 '... If You Buy A Computer, Don't Turn It On.'
  • Why computers break down. How to purchase the machine that's right for you.
  • 3 SOS (Save Our Operating System)
  • Understanding software. How to update programs, while keeping your system safe.
  • 4 Building A Secure System
  • System-building for the technically competent - suiting your system to your needs and your budget.
  • 5 Vicious Viruses, Wiggling Worms And Bouncing Bombs
  • How to recognize and destroy your enemies.
  • Part 2: Taking Control Of Your Own Machine
  • 6 Thinking Digital
  • Data - understanding it, where to store it, how to keep it safe.
  • 7 The Curse Of Software
  • Control, crashes and the emergency brakes!
  • 8 In With The New And Out With The Old
  • Loading up trouble for yourself? How to install new software safely.
  • 9 Back-ups - Computer Lifesavers
  • You are backing up your data - aren't you?
  • Part 3: Going Cryptographic
  • 10 What Have You Got To Hide?
  • How to scramble your secrets and frighten governments.
  • 11 Locking Up Your Secrets
  • Choosing the level of security that's right for you.
  • 12 Wiping The Slate Clean
  • How to ensure your deleted files stay deleted.
  • Part 4: Networks, From LAN's To The Internet
  • 13 Networks And Network Security
  • How to secure your network against local and remote attacks.
  • 14 The Internet - Data Sharing Goes Global
  • What the internet can do for you - and how you can control it.
  • 15 The Unseen Enemies On The Web Internet traps and snares for the unwary.
  • 16 Surfing Unseen
  • How to browse anonymously.
  • 17 Cleaning Up Your Web Tracks
  • Making sure that no one knows where you have been.
  • 18 E-mail - A Double-edged Sword
  • How it works, who can read it, and how to protect your system from the nastiness lurking in attachments.
  • 19 Web Crime And Commerce
  • Internet crime, online stalking and spyware.
  • 20 Where Do The Children Play?
  • How to keep your kids out of trouble on the net.
  • Part 5: Trespassers Will Not Be Forgiven
  • 21 Hello Hackers, Everywhere!
  • What is a hacker? How to understand their ethics and avoid their attention
  • 22 The Trojan Horse
  • What they are and how to protect your system against them.
  • 23 Building A Wall Around Your Computer How to build a firewall to repel intruders.
  • 24 Now DO Something ... Develop YOUR security strategy.
  • Part 6: Resources
  • Appendix 1: List Of Common Trojan Horses
  • Helps to identify the Trojans that might attack your computer.
  • Appendix 2: A Useful List Of TLAs What all those abbreviations really mean.

L'auteur - Richard MacDonald

Richard MacDonald practices what he preaches. It is almost as difficult extracting personal information from him as it is to breach a computer secured to his specifications.
Under pressure, he admits to being a writer, lecturer and consultant in computer security.

Caractéristiques techniques

  PAPIER
Éditeur(s) Alpha Books
Auteur(s) Richard MacDonald
Parution 01/07/2002
Nb. de pages 416
Format 18,7 x 23,4
Couverture Broché
Poids 775g
Intérieur Noir et Blanc
EAN13 9780130081551
ISBN13 978-0-130-08155-1

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav.client@eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription