Skip to content

Personal Internet Security Guidebook Keeping Hackers and Crackers Out of Your Home

Best in textbook rentals since 2012!

ISBN-10: 0126565619

ISBN-13: 9780126565614

Edition: 2002

Authors: Tim Speed, Juanita Ellis, Steffano Korper

List price: $82.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

The newest attack point for hackers is home computers on DSL and cable modems. This book will show you how to set up a home network and protect it from hackers. Also covered is how to protect your computer on the road.
Customers also bought

Book details

List price: $82.95
Copyright year: 2002
Publisher: Elsevier Science & Technology
Publication date: 10/16/2001
Binding: Paperback
Pages: 202
Size: 7.50" wide x 9.25" long x 0.75" tall
Weight: 1.100
Language: English

Timothy Speed is an infrastructure and security architect for Lotus Professional Services (LPS), an IBM company. Tim has been involved in Internet and messaging security for the last 8 years. He has assisted with the Domino infrastructure at the Nagano Olympics and the Lotus Notes systems for the Sydney Olympics. Certifications include MCSE, VCA (VeriSign Certified Administrator), Lotus Domino CLP Principal Administrator, and Lotus Domino CLP Principal Developer. He and Juanita Ellis are the co-authors of books on Internet security and e-business.

Juanita Ellis has been at the forefront in working with corporations in the areas of convergence, computer Security and e-business. Some of these companies include Sony, JCPenney, SWBell, Boeing, Xerox, Bell Atlantic, MCI, Citibank and Toyota. Currently, she works with companies in helping deploy voice and data networks, converged solutions, VPN security and call center applications. In addition, she was a technical manager at Lotus/IBM for the southern, mid-Atlantic, and eastern regions of the United States. As a technical manager, she was responsible for designing and architecting enterprise-wide applications that integrated with enterprise resource planning systems, Internet…    

Foreword
Acknowledgments
Company Copyright Notices and Statements
Warnings and Disclaimers
Introduction
Virus
Worms
Trojan Horse
Port Scanning
File Share Attacks
DOS
Operating Systems (OS) Attacks
Scams
The Internet
Introduction
The Beginning of TCP/IP
TCP/IP and the Internet
Okay, Back to Reality
Why Ethernet?
Got DSL, Got Cable, May Have Trouble (Connecting to the Internet Today): The Internet and the Home User
The Personal Computer at Home
The Business Computer at Home
Connection Types (You Can't Get High on POTS)
Dial-Up
ISDN
DSL
Cable Modem
Connecting Your Home Network to the Internet
Connection Types
Network Interface Cards
Setting Up the NIC
HUB
Routers
What about Networking my MAC?
Personal Firewalls
Securing Your DS, Cable Modem, and Dial-Up Connection
Virus Review
Law
Software
Attacks against You and Your Pets
Good Security Practices
The Approach
Scenario One
Scenario Two
Scenario Three
Scenario Four
A Quick Overview of a Wireless Home Network
Network Card for the PC
The Access Point
Operating Range
Dial-up Configuration Settings
WinIPCfg
IPConfig
Junk and Spam
The Junk
The "Spam"
Physical Security and Insurance
Where Are the Risks?
Theft-Prevention Devices
Alarms
Antitheft Devices
Security Enclosures
Automatic Alert System
Other Considerations
Insurance
PC Security Check List
Data Protection
Windows 2000 EFS
A Vendor Solution (Gatekeeper)
Smart Cards
Keep Your Data Private
Who Is Keeping Us Safe?
How Are You Being Tracked?
The FBI and Carnivore
Privacy Tools
Privacy References
Encryption For Your PC
A History of Cryptography
Key Types
How a Public-Private Encryption System Works
RSA: Public and Private Keys
PGP
Digital Signatures
S/MIME
Digital Certificates
How It All Works
Now the Packet Sniffer
Securing the Link with Secure Sockets Layer (SSL)
Using and Managing Certificates
Reference Books about Encryption
Security Hardware and Software Reference Section
Encryption
Filters
General Protections
Personal Firewall
Physical Security
User Authentication
Virus Protection
TCP/IP Reference
IP Address Classes
Domains
ARP and Routing
Ports
DHCP
Glossary
Index