Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Walker A. — Absolute Beginner's Guide To: Security, Spam, Spyware & Viruses
Walker A. — Absolute Beginner's Guide To: Security, Spam, Spyware & Viruses



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Absolute Beginner's Guide To: Security, Spam, Spyware & Viruses

Автор: Walker A.

Аннотация:

Batten down the hatches! Hackers, spammers and thieves (oh my!) are after you! The mere act of turning on an Internet-connected computer can put you, your family, and your personal finances at risk by exposing you to viruses, scam artists, hackers, identity thieves, and spammers. How do you fight back? Absolute Beginner's Guide to Security, Spam, Spyware and Viruses is your first line of defense.

Clear, easy-to-understand definitions of viruses, spyware, and hackers will help you understand what you're up against everytime you go online. Then, you'll learn about other threats, such as identity theft, phishing, and other potential dangers you'll face in your everyday computing. Find out how to search out and destroy spyware, malware and other viscious programs that could potentially harm your computer. Then find out how to lock out hackers, spammers, and theives for good.

We'll tell you how to immediately cut the risk of being attacked in half in less than 10 minutes! Protect your bank accounts, digital photos, digital music collection, masters thesis, and everything you hold near and dear on your computer with the help of the Absolute Beginner's Guide to Security, Spam, Spyware and Viruses.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 384

Добавлена в каталог: 08.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Windows Update      
Windows Update, accessing      2nd
Windows Update, importance of      
Windows Update, installing      
Windows updates      
Windows Updates, installing      
Windows validation process      
Windows validation process, failing      
Windows XP      
Windows XP firewall      
Windows XP firewall, turning on      2nd
Windows XP install CDs      
Windows XP install CDs, wiping hard drives      2nd 3rd
Windows XP, product key      
Windows XP, product key, recovering      
windows, activating      
Windows, activating, importance of      2nd
Windows, anti-spyware programs      [See Microsoft AntiSpyware]
Windows, clipboards      
Windows, clipboards, clearing      2nd
Windows, computer names      
Windows, computer names, changing      
Windows, File and Settings Transfer Wizard      
Windows, File and Settings Transfer Wizard, utilizing      2nd
Windows, My Recent Documents      
Windows, My Recent Documents, clearing      
Windows, product keys      
Windows, product keys, description of      
Windows, re-installing      
Windows, re-installing, importance of      2nd
Windows, reinstaling      
Windows, reinstaling, how to      2nd
Windows, reinstalling      
Windows, reinstalling, backing up before      2nd 3rd 4th
Windows, reinstalling, drivers, preserving      2nd 3rd
Windows, reinstalling, supplies required for      2nd
Windows, reinstalling, system recovery CDs      2nd
Windows, reinstalling, unplugging the network      
Windows, reinstalling, wiping supplies required for      [See also hard drives]
Windows, reinstalling, wiping the hard drive      2nd
Windows, restore points      
Windows, restore points, cleaning      2nd
Windows, securing      
Windows, securing, trashing unnecessary programs      
Windows, Security bar      
Windows, Security bar, adding      
Windows, startup programs      
Windows, startup programs, list of      
Windows, startup programs, trashing      2nd
Windows, Temp folders      
Windows, Temp folders, contents, erasing      
Windows, unnecessary programs      
Windows, unnecessary programs, trashing      2nd
Windows, updating      
Windows, updating, dangers of      2nd
Windows, updating, overview      2nd
Wired Equavalent Privacy      [See WEP]
wireless connections      
wireless connections, updating routers through      
wireless hackers      
wireless hackers, description of      
wireless networks      
wireless networks, bandwidth theft      
wireless networks, bandwidth theft, description of      2nd
wireless networks, dangers      
wireless networks, dangers, overview      2nd
wireless networks, DHCP logs      
wireless networks, DHCP logs, assessing      2nd
wireless networks, DHCP logs, overview      2nd
wireless networks, file sharing      
wireless networks, file sharing, dangers      2nd
wireless networks, file sharing, disabling      2nd
wireless networks, firewalls      
wireless networks, firewalls, turning on      2nd
wireless networks, holes      
wireless networks, holes, overview      2nd
wireless networks, MAC addresses      
wireless networks, MAC addresses, locating      
wireless networks, MAC addresses, Mac OS X      
wireless networks, MAC addresses, Windows 95, 98, and ME      
wireless networks, MAC addresses, Windows XP      
wireless networks, overview      2nd
wireless networks, routers      
wireless networks, routers, changing IDs and passwords      2nd
wireless networks, routers, default IDs and passwords      
wireless networks, routers, reseting IDs and passwords      
wireless networks, routers, set-up, accessing      
wireless networks, routers, set-ups, accessing      
wireless networks, security      
wireless networks, security software      
wireless networks, security technologies      
wireless networks, security technologies, WEP      2nd 3rd
wireless networks, security technologies, WPA      2nd
wireless networks, security, MAC address filtering      2nd 3rd
wireless networks, SSIDs      
wireless networks, SSIDs, changing      2nd
wireless networks, turning off      2nd
wireless networks, turning off, advantages of      
wireless networks, warchalking      
wireless networks, warchalking, description of      
wireless networks, wardriving      
wireless networks, wardriving, description of      2nd
wireless networks, wardriving, how to      2nd
wireless networks, Wi-Phishing      
wireless networks, Wi-Phishing, description of      2nd
worms      [See also viruses]
worms, Blaster      
worms, Blaster, description of      
worms, effects of      
worms, KakWorm      
worms, KakWorm, description of      
worms, overview      2nd
worms, Sasser      
worms, Sasser, description of      
worms, versus Trojan horses and viruses      2nd
WPA      
WPA, overview      2nd
XP Pro      
XP Pro, Simple File Sharing      
XP Pro, Simple File Sharing, disabling      2nd
XP Pro, user accounts      
XP Pro, user accounts, utilizing      2nd
Yahoo! Messenger      
Yahoo! Messenger, chat logs      
Yahoo! Messenger, chat logs, disabling      
zombies      
zombies, description of      
zombies, hacker's purpose for      2nd
ZoneAlarm      
ZoneAlarm, description of      
ZoneAlarm, utilizing      2nd 3rd
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте