Flylib.com
PC Magazine Windows Vista Security Solutions
PC Magazine Windows Vista Security Solutions
ISBN: 0470046562
EAN: 2147483647
Year: 2004
Pages: 135
Authors:
Dan DiNicolo
BUY ON AMAZON
Table of Contents
Back Cover
PC Magazine Windows Vista Security Solutions
Introduction
Part I: Getting Down to the Business of Securing Windows Vista
Chapter 1: A Short Introduction to Securing Windows Vista
The Five Golden Rules of Windows Security
The Security Map
Summary
Chapter 2: Implementing User Accounts and Logon Security
Creating User Accounts
Managing User Accounts
User Account Control and the Run As Command
Summary
Chapter 3: Implementing Password Security
Windows Vista Passwords
Implementing Password and Account Lockout Policies
Storing Passwords Securely
Implementing Additional Password Security Options
Summary
Chapter 4: Using Built-in Tools and Settings to Improve Windows Vista Security
Reviewing the Security Event Log
Using Windows Security Center
Configuring Local Security and Policy Settings
Summary
Part II: Making Surfing Safer
Chapter 5: Securing Your Web Browser
Securing Internet Explorer
Using Other Web Browsers
Summary
Chapter 6: Implementing Parental Controls
Keeping Children Safe Online
Restricting Internet Access Using Parental Controls
Using Content Filtering in Business Environments
Summary
Part III: Protecting Windows Vista Against Internet Threats
Chapter 7: Protecting Windows Vista with a Firewall
Understanding the Role of a Firewall
Configuring Windows Firewall
Using Windows Firewall with Advanced Security
Implementing Third-Party Firewall Software
Testing Your Firewall
Summary
Chapter 8: Keeping Windows Vista Patched and Protected
Windows Vista Update Options
Patching Beyond Vista
Summary
Chapter 9: Protecting Against Viruses
Understanding Viruses
Protecting Against Viruses
Removing Viruses
Summary
Chapter 10: Fighting Malware-Protecting Against Spyware, Adware, and Browser Hijackers
Protecting Against Malware
Removing Malware
Summary
Part IV: Messaging Your Way to E-mail Security
Chapter 11: The Dark Side of Spam
Understanding Spam
Fighting Spam
Summary
Chapter 12: Securing E-mail Messages Using Encryption and Digital Signatures
The Need for E-mail Security
Secure E-mail Components
How Secure E-mail Works
Obtaining, Installing, and Managing Digital Certificates
Signing and Encrypting E-mail Messages
Secure E-mail Alternatives
Summary
Part V: Protecting Your Files
Chapter 13: Controlling Access to Your Personal Files
Using Personal and Public Folders
Configuring File and Folder Security Settings Manually
Summary
Chapter 14: Improving File Security Using Encryption
Protecting Files with EFS
Using a Third-Party Encryption Solution
Summary
Chapter 15: Erasing Files and Hard Drives Securely
Erasing Files Securely
Covering Your Internet Tracks
Erasing Hard Drives Securely
Summary
Part VI: Securing Your Home Network
Chapter 16: Securing Shared Folders and Printers
Sharing Network Resources
Sharing and Securing Folders
Connecting to Shared Folders
Sharing and Securing Printers
Summary
Chapter 17: Securing Windows Vista on Wireless Networks
Securing Wireless Access Points
Limiting Access to Wireless Networks
Securing Wireless Network Traffic with Encryption
Summary
Part VII: Appendixes
Appendix A: Reinstalling Windows Vista
Installing Windows Vista
Post-Installation Tasks
Appendix B: Helpful Windows Vista Security Web Sites
Windows Help and Support Page
Microsoft Security Home Page
TechNet Security Home Page
Windows Vista Security and Protection
Windows Vista Community
PC Magazine Security Watch
The Elder Geek on Windows Vista
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W-X
Y
Z
List of Figures
List of Sidebars
PC Magazine Windows Vista Security Solutions
ISBN: 0470046562
EAN: 2147483647
Year: 2004
Pages: 135
Authors:
Dan DiNicolo
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
ORM Constraints
Mapping ORM Models to Logical Database Models
Conceptual Model Reports
Generating a Physical Database Schema
Logical Database Model Reports
SQL Tips & Techniques (Miscellaneous)
Using SQL Data Definition Language (DDL) to Create Data Tables and Other Database Objects
Working with Functions, Parameters, and Data Types
Understanding Transaction Isolation Levels and Concurrent Processing
Writing External Applications to Query and Manipulate Database Data
Working with SQL Database Data Across the Internet
Network Security Architectures
Everything Is a Weapon
You Cant Buy Network Security
References
The Difficulties of Secure Networking
References
MySQL Clustering
Installing MySQL-Max
Restarting a Cluster
Testing Your Cluster
Data Retrieval in MySQL Cluster
Physical Factors
Twisted Network Programming Essentials
Installing Twisted
Downloading a Web Page
Managing a Hierarchy of Resources
Installing SOAP Libraries
Using Authentication with Perspective Broker
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Getting to Know AutoCAD
Basic Commands to Get Started
Generating Elevations
Working with Hatches and Fills
Using Layouts to Set Up a Print
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies