Home Network Security Simplified

Author:   Jim Doherty ,  Neil Anderson
Publisher:   Pearson Education (US)
ISBN:  

9781587201639


Pages:   224
Publication Date:   03 August 2006
Format:   Paperback
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Our Price $65.97 Quantity:  
Add to Cart

Share |

Home Network Security Simplified


Add your own review!

Overview

A straightforward, graphic-based reference for securing your home network  Set up a firewall Secure your wireless network Stop adware and spyware Keep your children safe from online threats Prevent a virus outbreak Avoid Internet scams  Phishing. Malware. Spyware. Trojan horses. Firewalls. Parental controls. If you have a home computer connected to the Internet, you need to understand these security terms. If that connection is high-speed (always on) or you run a wireless network, your need–your vulnerability–is that much greater. Now, with Home Network Security Simplified, you can get illustrated, easy-to-digest information written specifically for your needs.   For each class of security threat, Home Network Security Simplified provides a tutorial–including tricks and tools that hackers use, a primer on network security design fundamentals, and step-by-step instructions on implementing security solutions. The authors also offer tips for monitoring your network and show what to do in the event of a security breach. Specifically, you will learn how to: Home Network Security Simplified features engaging four-color illustrations throughout, as well as informative security tips and pointers to other resources for more advanced information. Use this book to find the peace of mind that comes with knowing that your home network and your information are secure.   Jim Doherty is the director of marketing and programs with Symbol Technologies’ industry solutions group. Prior to joining Symbol, Jim worked at Cisco Systems, where he led various marketing campaigns for IP telephony and routing and switching solutions. Jim has 17 years of engineering and marketing experience across a broad range of networking and communications technologies. Jim is a coauthor of the Networking Simplified series, including Cisco Networking Simplified, Home Networking Simplified, and Internet Phone Services Simplified. He is also the author of the “Study Notes” section of CCNA Flash Cards and Exam Practice Pack (CCNA Self-Study, Exam #640-801), Second Edition. Jim is a former Marine Corps sergeant; he holds a bachelor’s degree in electrical engineering from N.C. State University and a master’s degree in business administration from Duke University.   Neil Anderson is the senior manager of enterprise systems engineering at Cisco Systems. Neil has more than 20 years of engineering experience including public telephone systems, mobile phone systems, Internet, and home networking. At Cisco, Neil’s focus is large corporate customers in the areas of routing and switching, wireless, security, and IP communications. Neil is a coauthor of the Networking Simplified series, including Home Networking Simplified and Internet Phone Services Simplified. Neil holds a bachelor’s degree in computer science.   This book is part of the Networking Technology Series from Cisco Press®, the only authorized publisher for Cisco Systems.  

Full Product Details

Author:   Jim Doherty ,  Neil Anderson
Publisher:   Pearson Education (US)
Imprint:   Cisco Press
Dimensions:   Width: 25.50cm , Height: 1.10cm , Length: 20.40cm
Weight:   0.513kg
ISBN:  

9781587201639


ISBN 10:   1587201631
Pages:   224
Publication Date:   03 August 2006
Audience:   College/higher education ,  Tertiary & Higher Education
Format:   Paperback
Publisher's Status:   Out of Print
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Table of Contents

Introduction   Chapter 1        Tip 1: Use Firewalls Why Do I Need Firewalls? How Firewalls Work Stateful Packet Inspection Firewalls   Personal Software Firewalls   Putting Firewalls to Work   Putting a Firewall Between You and the Internet    Enabling Personal Firewalls on Your Computers   Test Driving Your New Protection   What to Do If You Think You’ve Been Hacked   Sometimes, Firewalls Block the Good Stuff   Summary   Where to Go for More Information     Chapter 2        Tip 2: Secure Your Wireless Network   Why Should I Care About Wireless Network Security?   What Do I Do About Wireless Security?   Change Your Password   Do Not Advertise Your Wireless Network   Scramble Your Signal   Disable Ad-Hoc Networking   How to Do It: Securing Your Wireless Network   Change the Router’s Default Password   Stop Advertising Your Wireless Network   Enable Wireless Encryption   Disable Ad-Hoc Networking   Prevent Unintentional Roaming   Wireless Security Checklist   Summary   Where to Go for More Information     Chapter 3        Tip 3: Use Antivirus Protection   What Are Computer Viruses?   Viruses   Worms   Trojan Horses   Commonsense Approach to Computer Viruses   How Antivirus Works   Virus Detection   Virus Prevention   Inoculating Yourself Against Computer Viruses   Turning On Antivirus at Your ISP    Installing Antivirus Software on Your Computers   Windows Live OneCare   What to Do If You Think You’ve Been Infected   Summary   Where to Go for More Information     Chapter 4        Tip 4: Keep Your Software Updated   Why Software Needs to Be Updated   Updating Your Operating System   Enabling Automatic Updates   Manual Operating System Updates   Updating Your Software Programs   Using Windows Restore Points   Creating a Restore Point    Restoring Your Computer to a Restore Point    What to Do If You Think Your Operating System Has Been Compromised   Summary   Where to Go for More Information     Chapter 5        Tip 5: Lock Out Spyware and Adware   What Is Spyware and Adware?   Adware    Spyware   Are Spyware and Adware Viruses?   Preventing Spyware and Adware   Exercising Common Sense   Installing a Popup Blocker   Installing an Antispyware/Antiadware Program   What to Do If You Think You’ve Been Infected   Spyware/Adware-Removal Tools   Removing Spyware and Adware Programs Using the Installed Programs List   Summary   Where to Go for More Information     Chapter 6     Tip 6: Keep an Eye on Your Kids   What Are the Dangers Your Kids Might Encounter Online?   Pornography   Predators   Gambling   Hacking   Illegal Peer-to-Peer Sharing   Maybe I Should Rethink This Internet Thing   Preparing Kids for Being Online   Establish and Communicate the Internet Usage Policy   Making Kids Aware of Online Dangers   Avoid Giving Out Personal Information Online   Policing Kids Online   Browse in Plain Sight   Monitor and Review Your Kids’ Websites and Blogs   Check Out Your Kids’ Blogs   Review Website History   Using Parental Controls   Parental Controls at Your ISP   Parental Controls at Your Home Network Router   Parental Controls on Your Computers   What to Do If You Think Your Child Is Abusing the Rules   Activity Loggers   Summary   Where to Go for More Information     Chapter 7     Tip 7: Recognize and Avoid Phishing Scams   How Phishing Scams Work    Tricks of the Trade   How to Avoid Becoming a Victim   What to Do If You Suspect You Are the Target of a Phishing Scam   Summary   Where to Go for More Information     Chapter 8     Tip 8: Create Strong Passwords   Anatomy of a Lousy Password   Elements of a Strong Password   How to Create a Strong Password That You Can Remember   Additional Password Tips   Summary   Where to Go for More Information     Chapter 9     Tip 9: Back Up Your Files   What Should I Back Up?   Where Do I Back Up To?   How Often Should I Back Up?   Storage Method Overview   Flash Memory    External Hard Drives    Networked Storage   Online Storage   DVD or CD Storage   Summary of Storage Options   Putting It All Together   Using Windows XP Backup   Summary   Where to Go for More Information     Chapter 10   Tip 10: Use Common Sense   Urban Legends    E-Mail Stock Tips (Pump-and-Dump Scams)   Work from Home (Pyramid) Schemes   Money-Exchange Schemes   “Hot” Merchandise Scam   What to Do to Protect Yourself   Summary   Where to Go for More Information     Chapter 11   ”They Couldn’t Hit an Elephant at This Distance”     Glossary     Index    

Reviews

Author Information

Jim Doherty is a Director of Strategic Marketing and Mobility Solutions at Symbol Technologies. Jim coauthored Home Networking Simplified, Cisco Networking Simplified, and other key titles by Cisco Press. Jim has 13 years of experience in the telecom and networking industries.   Neil Anderson is a manager in Enterprise Systems Engineering at Cisco Systems. Neil coauthored Home Networking Simplified, published by Cisco Press. Neil has over 20 years of diverse telecom experience, including public telephone systems, mobile telephone systems, IP networks, wireless, and home networks.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List