可借阅:*
图书馆 | 资料类型 | 排架号 | 子计数 | 书架位置 | 状态 | 图书预约 |
---|---|---|---|---|---|---|
正在检索... Branch | Book | 005.8 DANDA | 1 | Stacks | 正在检索... 未知 | 正在检索... 不可借阅 |
正在检索... Science | Book | QA76.9 .A25 D36 2001 | 1 | Stacks | 正在检索... 未知 | 正在检索... 不可借阅 |
链接这些题名
已订购
摘要
摘要
Details essential security and privacy issues for the nontechnical user, covering advances in Internet security, related legislation, and taking an active role in protecting hardware, software, and personal information.
评论 (2)
《学校图书馆杂志》(School Library Journal)书评
Despite the growing number of computer users, online security books for the average person are lacking. Although geared toward users of Microsoft products (e.g., it goes into great detail about Microsoft Outlook viruses), this timely work presents an excellent general overview of the concepts of online privacy and security, threats to privacy, the Internet itself, cryptography, and other relevant topics. Recommended for all libraries. (c) Copyright 2010. Library Journals LLC, a wholly owned subsidiary of Media Source, Inc. No redistribution permitted.
《图书馆杂志》(Library Journal )书评
Despite the growing number of computer users, online security books for the average person are lacking. Although geared toward users of Microsoft products (e.g., it goes into great detail about Microsoft Outlook viruses), this timely work presents an excellent general overview of the concepts of online privacy and security, threats to privacy, the Internet itself, cryptography, and other relevant topics. Recommended for all libraries.(c) Copyright 2010. Library Journals LLC, a wholly owned subsidiary of Media Source, Inc. No redistribution permitted.
目录
Foreword | p. XVII |
Acknowledgments | p. XXI |
Introduction | p. XXIII |
Part 1 Privacy and Security Basics | |
Chapter 1 Beginning Your Online Journey | p. 3 |
Overcoming the Fear | p. 3 |
What Am I Protecting Myself From? | p. 4 |
Privacy and Security: The Big Picture | p. 6 |
Privacy and Security Today | p. 8 |
Learning to Protect Yourself Online | p. 9 |
Summary | p. 10 |
Chapter 2 Internet Fundamentals | p. 11 |
What Is the Internet? | p. 11 |
The World Wide Web | p. 15 |
How E-Mail Works | p. 16 |
TCP/IP Primer | p. 18 |
Summary | p. 23 |
Chapter 3 A New Breed of Threats | p. 25 |
General Loss of Privacy | p. 25 |
New Medium for Old Problems | p. 29 |
New Ways to Eavesdrop | p. 32 |
Denial-of-Service Attacks | p. 37 |
More Efficient Viruses | p. 39 |
Summary | p. 40 |
Chapter 4 Cryptography and Encryption | p. 41 |
Cryptography on the Internet | p. 41 |
Public Key Infrastructure (PKI) | p. 52 |
Secure Sockets Layer (SSL) | p. 54 |
Pretty Good Privacy (PGP) | p. 55 |
Secure/Multipurpose Internet Mail Extensions (S/MIME) | p. 58 |
Summary | p. 58 |
Chapter 5 Computer Viruses | p. 61 |
The Evolving Virus | p. 72 |
Protecting Yourself from Viruses | p. 75 |
Summary | p. 80 |
Part 2 Web Privacy and Security | |
Chapter 6 Downloading Stuff from the Web | p. 85 |
What Are the Dangers? | p. 86 |
Changing Security Settings in Internet Explorer | p. 87 |
What Kinds of Files and Programs Is My Browser Downloading? | p. 90 |
Cookies | p. 91 |
ActiveX Controls and Java Applets | p. 101 |
Scripts | p. 107 |
Plug-ins | p. 108 |
Tips for Downloading Files Safely | p. 109 |
Summary | p. 110 |
Chapter 7 Shopping and Trading on the Web | p. 111 |
E-Commerce and the Web | p. 111 |
Protecting Your Transactions | p. 113 |
Spotting Fraud | p. 117 |
Protecting Your Privacy | p. 120 |
Tips for Using E-Commerce Safely | p. 125 |
Summary | p. 127 |
Chapter 8 Mailing Lists, Newsgroups, and Chat Rooms | p. 129 |
Mailing Lists and Newsgroups | p. 129 |
Chat Rooms | p. 133 |
Tips for Using Mailing Lists, Newsgroups, and Chat Rooms Safely | p. 134 |
Summary | p. 138 |
Chapter 9 Filtering Out Offensive Content | p. 139 |
Filtering Content in Internet Explorer | p. 139 |
Other Content Filters | p. 145 |
Tips for Protecting Children on the Web | p. 147 |
Summary | p. 148 |
Chapter 10 Web Privacy for the Paranoid | p. 149 |
Who Is Following You? | p. 149 |
How Do They Know Where You've Been? | p. 152 |
Covering Your Tracks | p. 154 |
Tips for Protecting Your Privacy | p. 163 |
Summary | p. 164 |
Part 3 E-Mail Privacy and Security | |
Chapter 11 Encrypting and Signing E-Mail Messages | p. 167 |
E-Mail Privacy | p. 167 |
E-Mail Encryption Revisited | p. 171 |
Getting a Digital ID | p. 173 |
Protecting Your Digital ID | p. 177 |
Digitally Signing E-Mail Messages | p. 182 |
Encrypting E-Mail Messages | p. 187 |
Trusting Digital IDs | p. 190 |
Summary | p. 193 |
Chapter 12 Spam | p. 195 |
What Is Spam? | p. 195 |
Dealing with Spam | p. 201 |
Tips for Avoiding Spam | p. 210 |
Summary | p. 211 |
Chapter 13 E-Mail Privacy for the Paranoid | p. 213 |
E-Mail Privacy Revisited | p. 213 |
Cleaning Up Messages on Your Computer | p. 215 |
Changing Security Zones | p. 225 |
Impersonation and Anonymity | p. 228 |
Tips for E-Mail Privacy and Security | p. 235 |
Summary | p. 236 |
Part 4 Desktop Security | |
Chapter 14 Understanding Your Computer's Vulnerabilities | p. 239 |
What Should I Be Worried About? | p. 239 |
Perimeters of Vulnerability | p. 242 |
Vulnerability of Your Workplace Computer | p. 251 |
Summary | p. 252 |
Chapter 15 Using Strong Passwords | p. 255 |
Creating Passwords | p. 255 |
Using Passwords Safely | p. 259 |
Finding Lost Passwords | p. 262 |
Passwords and Smart Cards | p. 266 |
Tips for Using Passwords | p. 268 |
Summary | p. 268 |
Chapter 16 Securing Your Laptop Computer | p. 271 |
Laptop Theft | p. 271 |
Securing a Laptop Computer | p. 273 |
Recovering a Stolen Laptop | p. 275 |
Tips for Laptop Security | p. 277 |
Summary | p. 277 |
Chapter 17 Securing Your Connections | p. 279 |
Security Risks of Connecting to the Internet | p. 279 |
Scanning for Weaknesses | p. 282 |
Protecting Your Computer with a Firewall | p. 283 |
Virtual Private Networks | p. 288 |
Checklist for Securing Your Internet Connection | p. 289 |
Summary | p. 290 |
Chapter 18 Securing Your Computer at Work | p. 291 |
Keeping People Out of Your Computer | p. 291 |
Using a Password-Protected Screen Saver | p. 292 |
Encrypting Files on Your Hard Drive | p. 294 |
Remote Access Software | p. 299 |
Deleting Files Permanently | p. 301 |
Tips for Keeping People Out of Your Computer | p. 303 |
Summary | p. 304 |
Chapter 19 Backing Up Your Files | p. 305 |
Why Backups Are So Important | p. 305 |
Making Backups | p. 306 |
Using Microsoft Backup | p. 308 |
Tips for Backing Up Your Files | p. 314 |
Summary | p. 315 |
Index | p. 317 |