Skip to content

Safe and Secure Secure Your Home Network and Protect Your Privacy Online

Best in textbook rentals since 2012!

ISBN-10: 0672322439

ISBN-13: 9780672322433

Edition: 2002

Authors: Ali Mehrassa

List price: $24.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

This volume provides advice for keeping your broadband network safe and secure. It contains detailed configuration information for different operating systems and explains personal Internet security in layman's terms.
Customers also bought

Book details

List price: $24.99
Copyright year: 2002
Publisher: Sams
Publication date: 8/23/2001
Binding: Paperback
Pages: 384
Size: 7.50" wide x 9.25" long x 1.00" tall
Weight: 1.386
Language: English

Introduction
The Basics
Threats From the Internet
In This Chapter
The Internet Security Hysteria
Security Risks on the Internet
Viruses and Your Computer's Health
Keeping Private in a Wired World
Summary
Online Security Strategies
In This Chapter
Your Security Strategy
Summary
How the Internet Works
In This Chapter
PCs, LANS, and the Internet
TCP/IP: The Language of the Internet
Order in the Chaos: Routing
Summary
Network Infrastructure
In This Chapter
Twisted-Pair Ethernet
Phone-line Networking
Wireless Networking
Summary
Protecting a Home PC
Securing a Standalone System
In This Chapter
Security Liabilities of the Windows Networking Platform
Proper Configuration of a Windows 9x/Me Standalone System
Summary
Wireless Ethernet Security
In This Chapter
Wireless Ethernet Technology
Shared Key
Wired Equivalent Privacy
MAC Address Control
Choices in Wireless Ethernet Technology
Summary
Using Personal Firewall Software
In This Chapter
What to Look For in a Personal Firewall
How to Install a Personal Firewall
How to Properly Configure a Personal Firewall
Lock Panel
How to Maintain a Personal Firewall
Summary
The Dangers of Viruses on the Internet
In This Chapter
What Is a Malicious Program?
Types of Viruses
The Melissa Virus
The History of Viruses
Virus Hoaxes
Summary
Vaccinating Your Computer Against Viruses
In This Chapter
Scanning Techniques
Antivirus Software Packages
Installation and Configuration of Antivirus Software
Summary
Securing a Home Network
Overview of Firewalls
In This Chapter
Introduction to Firewalls
Why You Need a Firewall
Potential Attacks and Intrusions
How Do Firewalls Work?
Hardware Versus Software
Summary
Implementing a Proxy Server
In This Chapter
What a Proxy Server Does
Proxy Server Software Currently on the Market
How to Set Up a Proxy Server
Summary
Using a Broadband Router
In This Chapter
Broadband Routers Currently On the Market
How to Set Up a Broadband Router
What a Broadband Router Protects
Summary
The Benefits and Risks of Telecommuting
In This Chapter
The Advantages of Telecommuting
How Telecommuting Works
Risks of Telecommuting and Possible Solutions
Summary
Using Virtual Private Networks
In This Chapter
What Is a Virtual Private Network?
How Virtual Private Networks Are Used
How to Set Up a Virtual Private Network
Summary
Providing Internet Services
In This Chapter
The Risks of Internet Services
Limit Incoming Ports
Isolate Services
Allowing Controlled Access with a Demilitarized Zone
Summary
Privacy and Data Security
Human Issues in Security
In This Chapter
Submitting Information to a Web Site
Secure Web Connections
One-Time Transactions
Physical Security
Summary
Cookies
In This Chapter
What Is a Cookie?
Where Are My Cookies?
The Abuse of Cookies
How to Change Settings to Reject Cookies or to Warn when a Cookie Is Sent
When Do I Want to Accept Cookies?
Cookie Software
Other Possible Solutions to Cookies
Summary
Anonymous Surfing
In This Chapter
What Is Anonymous Surfing?
Browsing the Web Anonymously
Using E-mail Anonymously
Summary
Encryption
In This Chapter
What Is Encryption?
Encryption Basics
How to Use Encryption
The Pretty Good Privacy Encryption Tool
Summary
Testing and Recovery
Testing Your Security by Attacking Yourself
In This Chapter
Why Attack Yourself?
Basic Principles of Self Attacks
Online Port Scanning Services
Port Scanning Software
Summary
Managing Your Logs
In This Chapter
The Role of Logs
Log Management and Analysis Strategies
Example: ZoneAlarm Logs
Example: Linksys Cable/DSL Router Logs
Example: Norton AntiVirus
Summary
Recovering From a Disaster
In This Chapter
Get Offline
Have I Been Compromised?
My System Won't Boot
Recover Your Data
Analyze Your Security
Rebuild Your System
Summary
Maintaining Your Protection
In This Chapter
Keep Up-To-Date About Threats
Keep Your Software and Hardware Up-To-Date
Watch for the Signs
Summary
Backup Strategies
In This Chapter
What Is a Backup?
What Should You Back Up?
Strategies for Backup
Microsoft Backup Tool
Backup Devices
Summary
Appendices
Glossary
Resources
Firewall Software and Hardware
Antivirus Software
Antivirus Information
Security Alerts and Information
Network Technology
Major Operating Systems
Common TCP Services and Ports