Flylib.com
PC Magazine Windows Vista Security Solutions
PC Magazine Windows Vista Security Solutions
ISBN: 0470046562
EAN: 2147483647
Year: 2004
Pages: 135
Authors:
Dan DiNicolo
BUY ON AMAZON
Table of Contents
Back Cover
PC Magazine Windows Vista Security Solutions
Introduction
Part I: Getting Down to the Business of Securing Windows Vista
Chapter 1: A Short Introduction to Securing Windows Vista
The Five Golden Rules of Windows Security
The Security Map
Summary
Chapter 2: Implementing User Accounts and Logon Security
Creating User Accounts
Managing User Accounts
User Account Control and the Run As Command
Summary
Chapter 3: Implementing Password Security
Windows Vista Passwords
Implementing Password and Account Lockout Policies
Storing Passwords Securely
Implementing Additional Password Security Options
Summary
Chapter 4: Using Built-in Tools and Settings to Improve Windows Vista Security
Reviewing the Security Event Log
Using Windows Security Center
Configuring Local Security and Policy Settings
Summary
Part II: Making Surfing Safer
Chapter 5: Securing Your Web Browser
Securing Internet Explorer
Using Other Web Browsers
Summary
Chapter 6: Implementing Parental Controls
Keeping Children Safe Online
Restricting Internet Access Using Parental Controls
Using Content Filtering in Business Environments
Summary
Part III: Protecting Windows Vista Against Internet Threats
Chapter 7: Protecting Windows Vista with a Firewall
Understanding the Role of a Firewall
Configuring Windows Firewall
Using Windows Firewall with Advanced Security
Implementing Third-Party Firewall Software
Testing Your Firewall
Summary
Chapter 8: Keeping Windows Vista Patched and Protected
Windows Vista Update Options
Patching Beyond Vista
Summary
Chapter 9: Protecting Against Viruses
Understanding Viruses
Protecting Against Viruses
Removing Viruses
Summary
Chapter 10: Fighting Malware-Protecting Against Spyware, Adware, and Browser Hijackers
Protecting Against Malware
Removing Malware
Summary
Part IV: Messaging Your Way to E-mail Security
Chapter 11: The Dark Side of Spam
Understanding Spam
Fighting Spam
Summary
Chapter 12: Securing E-mail Messages Using Encryption and Digital Signatures
The Need for E-mail Security
Secure E-mail Components
How Secure E-mail Works
Obtaining, Installing, and Managing Digital Certificates
Signing and Encrypting E-mail Messages
Secure E-mail Alternatives
Summary
Part V: Protecting Your Files
Chapter 13: Controlling Access to Your Personal Files
Using Personal and Public Folders
Configuring File and Folder Security Settings Manually
Summary
Chapter 14: Improving File Security Using Encryption
Protecting Files with EFS
Using a Third-Party Encryption Solution
Summary
Chapter 15: Erasing Files and Hard Drives Securely
Erasing Files Securely
Covering Your Internet Tracks
Erasing Hard Drives Securely
Summary
Part VI: Securing Your Home Network
Chapter 16: Securing Shared Folders and Printers
Sharing Network Resources
Sharing and Securing Folders
Connecting to Shared Folders
Sharing and Securing Printers
Summary
Chapter 17: Securing Windows Vista on Wireless Networks
Securing Wireless Access Points
Limiting Access to Wireless Networks
Securing Wireless Network Traffic with Encryption
Summary
Part VII: Appendixes
Appendix A: Reinstalling Windows Vista
Installing Windows Vista
Post-Installation Tasks
Appendix B: Helpful Windows Vista Security Web Sites
Windows Help and Support Page
Microsoft Security Home Page
TechNet Security Home Page
Windows Vista Security and Protection
Windows Vista Community
PC Magazine Security Watch
The Elder Geek on Windows Vista
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W-X
Y
Z
List of Figures
List of Sidebars
PC Magazine Windows Vista Security Solutions
ISBN: 0470046562
EAN: 2147483647
Year: 2004
Pages: 135
Authors:
Dan DiNicolo
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Management Style
Phase: Speculate
Project Size
Practice: Participant Identification
Envision Summary
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Address Resolution Protocol (ARP)
Point-to-Point Protocol (PPP)
Internet Control Message Protocol (ICMP)
Internet Group Management Protocol (IGMP)
Dynamic Host Configuration Protocol (DHCP) Server Service
InDesign Type: Professional Typography with Adobe InDesign CS2
Readability
Leading Menu Options and Keyboard Shortcuts
Oldstyle Figures
First Impressions: Creating Great Opening Paragraphs
Tricks with Drop Caps
What is Lean Six Sigma
Key #2: Improve Your Processes
Key #3: Work Together for Maximum Gain
Key #4: Base Decisions on Data and Facts
Beyond the Basics: The Five Laws of Lean Six Sigma
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Using the System.Management Namespace
Querying WMI
Instrumenting .NET Applications with WMI
WMI Providers
GDI+ Programming with C#
Reading Metadata of Images
A Brief History of Printing with Microsoft Windows
GDI Interoperability
Cautions for Using GDI in Managed Code
Section A.3. Understanding Exception Classes
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies