رکورد قبلیرکورد بعدی

" PC magazine fighting spyware, viruses, and malware / "


Document Type : BL
Record Number : 985553
Doc. No : b739923
Main Entry : Tittel, Ed.
Title & Author : PC magazine fighting spyware, viruses, and malware /\ Ed Tittel.
Publication Statement : Indianapolis, IN :: Wiley Pub.,, ©2005.
Page. NO : xv, 367 pages :: illustrations ;; 24 cm
ISBN : 0764577697
: : 9780764577697
Bibliographies/Indexes : Includes bibliographical references (pages 333-339) and index.
Contents : Welcome to the Jungle! -- Unwelcome Intruders Seeking Entry -- It's a Jungle Out There! -- Understanding Spyware -- What Qualifies as Spyware? -- Signs of Potential Spyware Infestation -- Understanding Adware and Pop-Ups -- Using Task Manager to Halt a Pop-up Invasion -- Of Banners and Pop-Ups -- Understanding Spam -- Understanding Malware -- About Viruses, Worms, Trojans, and More -- Viruses -- Worms -- Trojan Horses, or Trojans for Short -- Definitions versus Real Life: Hybrid Viruses or "Blended Threats" -- What Can Malware Do? -- Diagnosing Malware: Watching for Changes on Your System -- How Malware Gets Reported, Rated, and Alerted -- About Vulnerabilities, Threats, and Exploits -- Reporting Malware and Other Unwanted Software -- About Malware Reports, Alerts, and Bulletins -- Where to Go for Malware and Other Alerts -- How Good PCs Go Bad -- Methods of Insertion and Delivery -- How Infection or Infestation Occurs -- More Signs of Infection or Infestation -- E-mail Attachments -- Automatic Invocation -- File Transfers -- Active Web Content -- Media-Based Infections -- By Invitation Only -- Detecting and Repairing PC Infestations -- What Can Go Wrong, Occasionally Will -- How the Pros Do It -- Anatomy of an Infection -- How To Clean Out Your System -- Worm W32. Randex. ATX -- ABetterInternet -- ClientMan.msdaim -- Where To Go for Help and Instruction -- Is Your PC Clean? -- Hoaxes -- The Particles of Protection -- Personal Firewalls -- What Is a Firewall? -- What Is TCP/IP and How Does It Relate to Firewalls? -- How a Firewall Looks at TCP/IP-Literally! -- Top Personal Firewall Picks -- Pondering the XP Default-Internet Connection Firewall/Windows Firewall -- Top Firewall Picks -- Installing and Using a Personal Firewall -- Checking Your Work -- Running Multiple Firewalls -- Other Paths to Firewall Bliss -- Pop-Up Blockers -- What Is a Pop-Up? -- How Do Pop-Ups Work? -- Blocking Pop-Ups with Software -- Top Pop-Up Blockers -- Pondering the XP Default -- Top Pop-Up Blocker Picks -- Checking Your Work -- Running Multiple Pop-Up Blockers -- Anti-Spyware and Anti-Adware Programs -- What Are Spyware and Adware, Really? -- Why Install Anti-Spyware/Anti-Adware? -- Scanning for Adware and Spyware -- Blocking Spyware and Adware -- Top Anti-Spyware/Anti-Adware Picks -- Installing and Using Anti-Spyware -- Checking Your Work -- Using Multiple Spyware/Adware Blockers -- Anti-Virus Programs -- Quick Virus Refresher -- Why Install Anti-Virus Software? -- How Anti-Virus Software Works -- Top Anti-Virus Picks -- Symantec Anti-Virus Products -- McAfee Anti-Virus Products -- Grisoft AVG Anti-Virus -- ALWIL avast! 4 Home Edition -- Installing and Using Anti-Virus Software -- Norton AntiVirus 2005 -- McAfee VirusScan 8.0 -- Grisoft's AVG 6.0 Anti-Virus Free Edition -- ALWIL avast! 4 Home Edition -- Using Multiple Anti-Virus Packages -- Spam Blockers -- Understanding E-mail Basics -- Why Block (or Otherwise Kill) Spam? -- A Brief Taxonomy of Spam -- How (and When) to Block or Filter Spam -- Spam Handling at Your ISP -- Spam Screening and Filtering Services -- Spam Screening and Filtering Software -- Working with Rules in Outlook -- What's New in Outlook 2003 SPl? -- The Sum Is Greater Than the Individual Parts -- If in a Lather, Switch, Don't Fight! -- Top Anti-spam Software and Service Picks -- Checking Your Work -- Using Multiple Spam Blockers -- Commonsense Rules for Safe Computing -- Practicing E-mail Safety -- Never Open Unexpected Attachments -- Blocking Attachments in Outlook -- Screen Your E-mail -- Recognizing Hoaxes and Spoofs -- Hoaxes -- Spoofs -- Beware E-mail Fraud: Phishing, Scams, and More -- Eleven Basic Rules for E-mail Safety -- When in Doubt, Play It Safe! -- Practicing Web Safety -- Understanding Browser Security -- Firefox from Mozilla -- Opera from Opera Software -- Exploring Common IE Security Settings -- Internet Content Zone -- Local Intranet Content Zone -- Trusted Sites Content Zone -- Restricted Sites Content Zone -- Summing up Security Settings -- Customizing Your Security Settings -- Managing Cookies -- Controlling Cookies with Privacy Settings for Web Content Zones -- Viewing Privacy Policy and Cookie Information in IE -- Spending Money Safely Online -- The Importance of Security Updates -- When in Doubt, Be Safe! -- Practicing System Safety -- Baselining Your System -- Creating a Process Inventory -- Understanding What You See -- Rough and Ready Performance Metrics -- Other Snapshots Worth Gathering -- Comparing Differences -- Monitoring System Security -- Proper Password Handling -- Stay Away from Risky Downloads -- When in Doubt, Play It Safe! -- The Habit of Security -- Safety Is a Matter of Routine -- Where to Focus Your Routines -- Cover All the Bases -- Keep Your Software Current -- If It's Important or Valuable, Back It Up! -- Making the Rounds -- Safety Requires Constant Vigilance -- Category 4 Characteristics -- Eyeing Security Events -- Third-Party Threat Information -- Vendor Threat Information -- Avoiding Potential Trouble -- The Personal PC Security Audit -- Staying Subscribed -- Where (or When) Will It End? -- The Security Suite Life -- Security Suite Offerings -- Shopping Advice -- Microsoft Knowledge Base -- Books and Articles -- Safe Download Sites -- Online Security Scanners -- For malware, spyware, and adware -- Spam -- Other online security scanners -- Blocking Software -- Password Management -- Security Issues and Information -- Software -- Virus hoaxes.
Abstract : Presents advice on creating a home computer network, covering such topics as designing a network, installing a LAN, configuring a network, Internet access, firewalls, and home entertainment components.
Subject : Computer security.
Subject : Computer viruses.
Subject : Malware (Computer software)
Subject : Spyware (Computer software)
Subject : Computer security.
Subject : Computer viruses.
Subject : Malware (Computer software)
Subject : Spyware (Computer software)
Subject : Computerbeveiliging.
Subject : Computervirussen.
Subject : Spyware.
Dewey Classification : ‭005.8‬
LC Classification : ‭QA76.9.A25‬‭T57 2005‬
NLM classification : ‭54.32‬bcl
: ‭54.32.‬bcl
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟