Home Network Security Simplified [NOOK Book]


A straightforward, graphic-based reference for securing your home network 

  • Set up a firewall
  • Secure your wireless network
  • Stop adware and spyware
  • Keep your children safe from online threats
  • Prevent a virus outbreak
  • Avoid Internet scams 

Phishing. Malware. ...

See more details below
Home Network Security Simplified

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac

Want a NOOK? Explore Now

NOOK Book (eBook)
BN.com price
(Save 42%)$19.99 List Price


A straightforward, graphic-based reference for securing your home network 

  • Set up a firewall
  • Secure your wireless network
  • Stop adware and spyware
  • Keep your children safe from online threats
  • Prevent a virus outbreak
  • Avoid Internet scams 

Phishing. Malware. Spyware. Trojan horses. Firewalls. Parental controls. If you have a home computer connected to the Internet, you need to understand these security terms. If that connection is high-speed (always on) or you run a wireless network, your need–your vulnerability–is that much greater. Now, with Home Network Security Simplified, you can get illustrated, easy-to-digest information written specifically for your needs.


For each class of security threat, Home Network Security Simplified provides a tutorial–including tricks and tools that hackers use, a primer on network security design fundamentals, and step-by-step instructions on implementing security solutions. The authors also offer tips for monitoring your network and show what to do in the event of a security breach. Specifically, you will learn how to:

Home Network Security Simplified features engaging four-color illustrations throughout, as well as informative security tips and pointers to other resources for more advanced information. Use this book to find the peace of mind that comes with knowing that your home network and your information are secure.


Jim Doherty is the director of marketing and programs with Symbol Technologies’ industry solutions group. Prior to joining Symbol, Jim worked at Cisco Systems, where he led various marketing campaigns for IP telephony and routing and switching solutions. Jim has 17 years of engineering and marketing experience across a broad range of networking and communications technologies. Jim is a coauthor of the Networking Simplified series, including Cisco Networking Simplified, Home Networking Simplified, and Internet Phone Services Simplified. He is also the author of the “Study Notes” section of CCNA Flash Cards and Exam Practice Pack (CCNA Self-Study, Exam #640-801), Second Edition. Jim is a former Marine Corps sergeant; he holds a bachelor’s degree in electrical engineering from N.C. State University and a master’s degree in business administration from Duke University.


Neil Anderson is the senior manager of enterprise systems engineering at Cisco Systems. Neil has more than 20 years of engineering experience including public telephone systems, mobile phone systems, Internet, and home networking. At Cisco, Neil’s focus is large corporate customers in the areas of routing and switching, wireless, security, and IP communications. Neil is a coauthor of the Networking Simplified series, including Home Networking Simplified and Internet Phone Services Simplified. Neil holds a bachelor’s degree in computer science.


This book is part of the Networking Technology Series from Cisco Press®, the only authorized publisher for Cisco Systems.


Read More Show Less

Product Details

  • ISBN-13: 9780133034868
  • Publisher: Pearson Education
  • Publication date: 8/9/2006
  • Sold by: Barnes & Noble
  • Format: eBook
  • Edition number: 1
  • Pages: 224
  • File size: 44 MB
  • Note: This product may take a few minutes to download.

Meet the Author

Jim Doherty is a Director of Strategic Marketing and Mobility Solutions at Symbol Technologies. Jim coauthored Home Networking Simplified, Cisco Networking Simplified, and other key titles by Cisco Press. Jim has 13 years of experience in the telecom and networking industries.


Neil Anderson is a manager in Enterprise Systems Engineering at Cisco Systems. Neil coauthored Home Networking Simplified, published by Cisco Press. Neil has over 20 years of diverse telecom experience, including public telephone systems, mobile telephone systems, IP networks, wireless, and home networks.

Read More Show Less

Table of Contents



Chapter 1        Tip 1: Use Firewalls

Why Do I Need Firewalls?

How Firewalls Work

Stateful Packet Inspection Firewalls  

Personal Software Firewalls  

Putting Firewalls to Work  

Putting a Firewall Between You and the Internet   

Enabling Personal Firewalls on Your Computers  

Test Driving Your New Protection  

What to Do If You Think You’ve Been Hacked  

Sometimes, Firewalls Block the Good Stuff  


Where to Go for More Information  


Chapter 2        Tip 2: Secure Your Wireless Network  

Why Should I Care About Wireless Network Security?  

What Do I Do About Wireless Security?  

Change Your Password  

Do Not Advertise Your Wireless Network  

Scramble Your Signal  

Disable Ad-Hoc Networking  

How to Do It: Securing Your Wireless Network  

Change the Router’s Default Password  

Stop Advertising Your Wireless Network  

Enable Wireless Encryption  

Disable Ad-Hoc Networking  

Prevent Unintentional Roaming  

Wireless Security Checklist  


Where to Go for More Information  


Chapter 3        Tip 3: Use Antivirus Protection  

What Are Computer Viruses?  



Trojan Horses  

Commonsense Approach to Computer Viruses  

How Antivirus Works  

Virus Detection  

Virus Prevention  

Inoculating Yourself Against Computer Viruses  

Turning On Antivirus at Your ISP   

Installing Antivirus Software on Your Computers  

Windows Live OneCare  

What to Do If You Think You’ve Been Infected  


Where to Go for More Information  


Chapter 4        Tip 4: Keep Your Software Updated  

Why Software Needs to Be Updated  

Updating Your Operating System  

Enabling Automatic Updates  

Manual Operating System Updates  

Updating Your Software Programs  

Using Windows Restore Points  

Creating a Restore Point   

Restoring Your Computer to a Restore Point   

What to Do If You Think Your Operating System Has Been Compromised  


Where to Go for More Information  


Chapter 5        Tip 5: Lock Out Spyware and Adware  

What Is Spyware and Adware?  



Are Spyware and Adware Viruses?  

Preventing Spyware and Adware  

Exercising Common Sense  

Installing a Popup Blocker  

Installing an Antispyware/Antiadware Program  

What to Do If You Think You’ve Been Infected  

Spyware/Adware-Removal Tools  

Removing Spyware and Adware Programs Using the Installed Programs List  


Where to Go for More Information  


Chapter 6     Tip 6: Keep an Eye on Your Kids  

What Are the Dangers Your Kids Might Encounter Online?  





Illegal Peer-to-Peer Sharing  

Maybe I Should Rethink This Internet Thing  

Preparing Kids for Being Online  

Establish and Communicate the Internet Usage Policy  

Making Kids Aware of Online Dangers  

Avoid Giving Out Personal Information Online  

Policing Kids Online  

Browse in Plain Sight  

Monitor and Review Your Kids’ Websites and Blogs  

Check Out Your Kids’ Blogs  

Review Website History  

Using Parental Controls  

Parental Controls at Your ISP  

Parental Controls at Your Home Network Router  

Parental Controls on Your Computers  

What to Do If You Think Your Child Is Abusing the Rules  

Activity Loggers  


Where to Go for More Information  


Chapter 7     Tip 7: Recognize and Avoid Phishing Scams  

How Phishing Scams Work   

Tricks of the Trade  

How to Avoid Becoming a Victim  

What to Do If You Suspect You Are the Target of a Phishing Scam  


Where to Go for More Information  


Chapter 8     Tip 8: Create Strong Passwords  

Anatomy of a Lousy Password  

Elements of a Strong Password  

How to Create a Strong Password That You Can Remember  

Additional Password Tips  


Where to Go for More Information  


Chapter 9     Tip 9: Back Up Your Files  

What Should I Back Up?  

Where Do I Back Up To?  

How Often Should I Back Up?  

Storage Method Overview  

Flash Memory   

External Hard Drives   

Networked Storage  

Online Storage  

DVD or CD Storage  

Summary of Storage Options  

Putting It All Together  

Using Windows XP Backup  


Where to Go for More Information  


Chapter 10   Tip 10: Use Common Sense  

Urban Legends   

E-Mail Stock Tips (Pump-and-Dump Scams)  

Work from Home (Pyramid) Schemes  

Money-Exchange Schemes  

“Hot” Merchandise Scam  

What to Do to Protect Yourself  


Where to Go for More Information  


Chapter 11   ”They Couldn’t Hit an Elephant at This Distance”  




Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)