|
![]() |
|||
|
||||
Overview* Shows how to recognize, prevent, and remedy problems caused by spyware, adware, and other ""malware,"" from compromised privacy and system slowdowns to annoying popups and interface changes * Explains how to clean up any messes that result from infection, unwanted software, or interface changes, including cleaning out the nastiest malware by hand * Perfect for the growing number of users who have always--on (and always--vulnerable) DSL or cable Internet connections at home but have absolutely no idea how to use a firewall Full Product DetailsAuthor: Ed Tittel (Austin, Texas)Publisher: John Wiley & Sons Inc Imprint: Hungry Minds Inc,U.S. Dimensions: Width: 18.70cm , Height: 2.00cm , Length: 23.30cm Weight: 0.560kg ISBN: 9780764577697ISBN 10: 0764577697 Pages: 382 Publication Date: 01 December 2004 Audience: General/trade , General Format: Paperback Publisher's Status: Out of Stock Indefinitely Availability: In Print ![]() Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock. Table of ContentsPreface.Acknowledgments.Part I: Welcome to the Jungle!Chapter 1: Unwelcome Intruders Seeking Entry.Chapter 2: Understanding Malware.Part II: How Good PCs Go Bad.Chapter 3: Methods of Insertion and Delivery.Chapter 4: Detecting and Repairing PC Infestations.Part III: The Particles of Protection.Chapter 5: Personal Firewalls.Chapter 6: Pop-Up Blockers.Chapter 7: Anti-Spyware and Anti-Adware Programs.Chapter 8: Anti-Virus Programs.Chapter 9: Spam Blockers.Part IV: Commonsense Rules for Safe Computing.Chapter 10: Practicing E-mail Safety.Chapter 11: Practicing Web Safety.Chapter 12: Practicing System Safety.Part V: The Habit of Security.Chapter 13: Safety Is a Matter of Routine.Chapter 14: Safety Requires Constant Vigilance.Appendix A: The Security Suite Life.Appendix B: References.Glossary.Index.ReviewsAuthor InformationEd Tittel has been writing, researching, and teaching about Windows security topics since 1996. An inveterate tinkerer cursed with incurable curiosity, he's become a connoisseur of protection tools and techniques to battle spyware, adware, and malware. Tab Content 6Author Website:Countries AvailableAll regions |