Computer Security and Privacy for Dummies

Overview

Whether you need an effective firewall system, a security policy, or antivirus software, you'll find all the information you need about safeguarding your PC or Mac inside.

Finally! A friendly, accessable reference to giude you through the intimidating task of securing your computer. Whether you're a casual home user or an experienced office worker, Computer Security For Dummies® deciphers the arcane language of security and control and helps you make sense of personal security ...

See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (9) from $21.17   
  • New (2) from $105.00   
  • Used (7) from $21.17   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$105.00
Seller since 2014

Feedback rating:

(113)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$203.04
Seller since 2014

Feedback rating:

(227)

Condition: New
Brand New Item.

Ships from: Chatham, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Whether you need an effective firewall system, a security policy, or antivirus software, you'll find all the information you need about safeguarding your PC or Mac inside.

Finally! A friendly, accessable reference to giude you through the intimidating task of securing your computer. Whether you're a casual home user or an experienced office worker, Computer Security For Dummies® deciphers the arcane language of security and control and helps you make sense of personal security issues and solutions. The fun and easy-to-follow advice helps you understand the risks and take the necessary steps to protect yourself from loss. With this book at your side, you can protect your data, create effective passwords, and back up those sensitive files!

Inside, you'll discover how to:

  • Understand the basic concepts and technobabble of computer secrecy
  • Discover the top ten threats to your personal computer and how to avoid them
  • Find out why it's so important to pick a proper password
  • Uncover why and how often sensitive data should be backed up
  • Use an online service securely
  • Recover lost word processor, spreadsheet, and database passwords quickly
  • Find the ten useful DOS, Windows, and Mac security utilities
  • Create firewalls to protect your PC or Mac from Internet attacks
  • Find out where to get more information about PC and Mac security software and its sources
Read More Show Less

Product Details

  • ISBN-13: 9781568846354
  • Publisher: Wiley, John & Sons, Incorporated
  • Publication date: 6/1/1996
  • Series: For Dummies Series
  • Pages: 360
  • Product dimensions: 7.40 (w) x 9.20 (h) x 0.92 (d)

Table of Contents

Introduction
Part I: The Basics
Chapter 1: The ABCs of Security
Security Exposed
Personal Computers Unmasked
Measuring the Value of Your Information
Asking the $128,000 Question
Taking the Security Path to Enlightenment
Chapter 2: Security Lingo and Australian Dingoes
What Is Security?
The Business of Threats
Denial of service
Accidental or intentional
Disclosure
Modification
Destruction
Misuse
Vulnerability: Being a '90s Kind of Person
Controls: For Control Freaks Only
Accountability
Identification
Authentication
Auditing
Separation of duty
What's This Risk Thing?
Defining risk
Managing risk
Chapter 3: Viruses, Password Grabbers, Trojan Horses, and Other Threats
Intentional Threats
Disclosure
Masquerading
Denial of service
Computer crime
Password grabbers
Viral attacks
Trojan horses, cuckoo eggs, and time bombs
Theft
Unintentional Threats
Zapping your data
Spikes, brownouts, and blackouts
Acts of God
Stupid human tricks
Chapter 4: Controlling the Threats
Understanding How Controls Work (For Type A Personalities)
Preventative
Detective
Corrective
Distinguishing the Types of Controls
Management controls
Physical controls
Logical access controls
Operational controls
Communications controls
Preventing Problems
Formal or informal controls?
Correcting problems
Detecting Problems
Putting the Control Issue to Rest
Chapter 5: Analyzing and Managing Risks
Prudence or Paranoia?
Costs, Benefits, and Risks
Analyzing Risk
Identifying which assets need protection
Determining the threats to those assets
Determining your vulnerability to the threats
Analyzing your current controls and safeguards
Selecting and implementing needed controls
Reducing, Retaining, Transferring, and Managing Risk
Risk Transference
Reevaluating Your Choices
Final Words on Risk Management
Part II: The Methods
Chapter 6: Keeping Your Computer Physically Secure
Hardware Restraints
Tie-downs
Key-locks
Audible alarms
Labeling
Cabinets
Floppy drive locks
Keyboard covers
Hardware-driven access controls
UPS, UPS, and Away
Grounding Your System
Locking the Door
Physically Protecting Your PC
Plug it in
Never leave a laptop unattended
Eliminate static
Manage the keys
Let an orangutan carry the laptop
Chapter 7: Controlling Access
Why Should You Control Access?
The Security Reference Model
Identification
Authentication
Authorization
Audit
Using Screen Savers for Security
Logging into Your Personal Computer
Logging into Windows 95
Setting up a password in Windows 95
Logging into Windows 3.1
Logging into Windows 3.11 or Windows for Workgroups
Logging into Windows NT
Logging into your Mac
Personal Computer Security Products
Secure Single Sign-On
Chapter 8: Picking Perfect Passwords
The Need for Strong Passcodes
Creating Good Passcodes
Sufficient length
Reasonable time period
Entering a Password Securely
Secrecy
Storing Passwords
Transmitting Passwords
Password Do's and Don'ts
Power-on Passwords: "More Power, Scotty! I Must Have More Power!"
How do power-on passwords work?
Should you use power-on passwords?
Logging in when you forget your password
The Last (Pass)Word
Chapter 9: Securing Word Processors, Spreadsheets, and Databases
Using Built-In Security Features
Word Processing Security
Microsoft Word Versions 5, 6, and 7
Corel WordPerfect 6.x
Spreadsheet Security
Microsoft Excel Versions 6 and 7
Microsoft Excel 5 for the Mac
Corel Quattro Pro 6.x
Other spreadsheets
Database Security
dBASE 5 for Windows
Microsoft Access
Other Applications with Built-In Security
Quicken for Windows Versions 4 and 5
Mac Television
Retrieving Those Forgotten Passwords
Chapter 10: Backing Up and Restoring
Why Back Up?
Figuring Out What to Back Up
Creating a Single Directory for Your Data Files
Tape Backups
Floppy Disk Backups
Deciding How Often to Back Up
Backup Techniques
Using DOS Backup and COPY
Using Windows 95 Backup
Doing Mac backups
Restoring backed-up files
Using commercial backup programs
Storing Backups
Testing Backups
Restoring Lost Files
Chapter 11: Eliminating Viruses, Worms, and Other Pestilence
Viruses Uncovered
Can I pass a Macintosh virus to a DOS-based PC?
Can I pass a DOS virus to my Mac?
Transmitting viruses
Classes and types of viruses
Worms
Trojan Horses
Other Malicious Programs
Viral Symptoms
Practical Solutions
Recovering from a virus
Software licensing
Virus Self-Help Groups
Good Virus Resources
The Last Word on Viruses
Part III: The Places
Chapter 12: Accessing the Internet and Other Online Services
Internet Security
Password sniffing
E-mail
Those nasty viruses
Cracking scripts available online
Here's looking at you, kid
Using Commercial Networks Securely
Nosy online providers
Who do you want to be?
Online services and encryption
Free speech and online services
Chat rooms
Chat spoofing and replicating
Online service integrity
Sending e-mail to the right place
Copyright Law Online
Copyright and e-mail
Copyright and data files
Downloading commercial programs
Digital Commerce
Online banking
Digital signatures
The Bogeyman and Parental Control
Blocking Offensive Web Content
The Last Mile on the Information Superhighway
Chapter 13: Using E-Mail Securely
What Is E-Mail?
Electronic Mail versus Paper Mail
E-Mail Crackers and Snoops
Easy pickings
Copies, copies everywhere
E-Mail Harassment
Keeping Your Private Mail Private
Tracing an e-mail message
Fakemail
Pass the Spam, please
Anonymous re-mailers
Sending E-Mail Securely
Encoding your messages
Encryption revealed
Very private keys: Single-key ciphers
Very public keys: Two-key ciphers
Digital signatures
PGP: Pretty good software
TIPEM, RIPEM, and Tyler, too
E-Mail Rights
E-Mail Security Tips
Chapter 14: Securing Your Files
Do You Need to Secure Files on Your Computer?
Using DOS to Help Secure Files
Inexpensive and free password protection
Encryption
True File Erasure
File Access Control
Part IV: The Part of Tens
Chapter 15: Ten Things All PC Users Should Do
Turn Off the Monitor or Use a Screen Saver
Buy a Surge Protector
Back It Up!
Clean the Monitor
Dust the Components
Protect the Computer from Static Electricity
Consider a Keyboard Cover
Monitor the Modem
Repair the Hard Drive
Run a Virus Checker Program
Chapter 16: Ten Useful Security Documents from the U.S. Government
FIPS Publications
Guidelines for Implementing and Using the NBS Data Encryption Standard
Standard on Password Usage
NCSC Technical Guidelines and Reports
Glossary of Computer Security Terms, Version 1
Computer Viruses: Prevention, Detection, and Treatment
NIST/NBS Special Publications
Security of Personal Computer Systems -- A Management Guide
Security for Dial-Up Lines
Computer Viruses and Related Threats: A Management Guide
Computer User's Guide to the Protection of Information Resources
A Guide to the Selection of Anti-Virus Tools and Techniques
An Introduction to Computer Security: The NIST Handbook
Chapter 17: Ten Useful DOS-Based PC Security Utilities
Access Control and Write Protection
Front gate access
Windows monitoring
Password generator
Keyboard locks
Password Recovery Programs
Microsoft Word Versions 1 and 2
Microsoft Word Versions 6 and 7
Corel WordPerfect 5.1
Microsoft Excel 5.0
True Erasure
Just for Fun: Changing Your Windows 95 Recycle Bin
Chapter 18: Ten Useful Mac Security Utilities
Access Control and Write Protection
BugOff
Firewall
PasswordMaker
PowerLock
SoftLock
Floppy Unlocker
StartupLog
Zorba "the Geek"?
True Erasure
Burn
Complete Delete
Virus Programs and Software Auditing
Cleaning your system with a strong Disinfectant
Looking up those symptoms with Virus Reference 2.1.6
Reviewing your software with KeyAudit
Chapter 19: Ten DOS Security Commands
ATTRIB
BACKUP
CHKDSK
COPY
XCOPY
DELETE
ERASE
FC
FDISK
FORMAT
RENAME
Chapter 20: Ten DOS and Windows Programs and Files to Protect
CONFIG.SYS
AUTOEXEC.BAT
IO.SYS and MSDOS.SYS
IBMBIO.SYS and IBMDOS.SYS
COMMAND.COM
WIN.COM
WIN.INI
SYSTEM.INI
.GRP and .INI
Chapter 21: Ten Ways to Secure Windows 95
Cutting a Startup Disk
Boot Bypass
Psst -- The Password Is Cancel
Password File Lists
Share to the World
More Sharing Than You Intended: Windows 95 File and Printer Sharing Security
Very Public Mail
Recovering the Registry
Controlling Panels
Share-Level (In)Security
Chapter 22: Ten Viruses and What They Do
Boza
Brain
Dark Avenger
Jerusalem
Joshi
Michelangelo
nVir (strains a and b)
SCORES
Stoned
Word Macro 9508
Chapter 23: Ten Useful Backup Devices
HP Colorado T1000
HP Colorado T1000e
Conner TapeStor
Iomega Zip
Iomega Jaz
SyQuest EZ135
SyJET1.3GB
Panasonic PD/CD-ROM Drive
PC Card Devices (PCMCIA)
DVD (Digital Video Disk)
Part V: Appendixes

Appendix A: I Want to Learn More
Useful Online Resources
Search Engines
Mailing Lists
USENET Newsgroups
Useful Publications
Helpful Organizations
Useful Books

Appendix B: Sources of Personal Computer Security
Software and Products
Security Sources on the Internet
Security Vendors

Appendix C: Glossary

Appendix D: Computer Security Acronyms
Index
Reader Response Card
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)