Home Network Security Simplified [NOOK Book]

Overview

A straightforward, graphic-based reference for securing your home network

  • Set up a firewall
  • Secure your wireless network
  • Stop adware and spyware
  • Keep your children safe from online threats
  • Prevent a virus outbreak
  • Avoid Internet scams

Phishing. Malware. Spyware. Trojan ...

See more details below
Home Network Security Simplified

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac

Want a NOOK? Explore Now

NOOK Book (eBook)
$11.49
BN.com price
(Save 42%)$19.99 List Price

Overview

A straightforward, graphic-based reference for securing your home network

  • Set up a firewall
  • Secure your wireless network
  • Stop adware and spyware
  • Keep your children safe from online threats
  • Prevent a virus outbreak
  • Avoid Internet scams

Phishing. Malware. Spyware. Trojan horses. Firewalls. Parental controls. If you have a home computer connected to the Internet, you need to understand these security terms. If that connection is high-speed (always on) or you run a wireless network, your need–your vulnerability–is that much greater. Now, with Home Network Security Simplified, you can get illustrated, easy-to-digest information written specifically for your needs.

For each class of security threat, Home Network Security Simplified provides a tutorial–including tricks and tools that hackers use, a primer on network security design fundamentals, and step-by-step instructions on implementing security solutions. The authors also offer tips for monitoring your network and show what to do in the event of a security breach. Specifically, you will learn how to:

Home Network Security Simplified features engaging four-color illustrations throughout, as well as informative security tips and pointers to other resources for more advanced information. Use this book to find the peace of mind that comes with knowing that your home network and your information are secure.

Jim Doherty is the director of marketing and programs with Symbol Technologies’ industry solutions group. Prior to joining Symbol, Jim worked at Cisco Systems, where he led various marketing campaigns for IP telephony and routing and switching solutions. Jim has 17 years of engineering and marketing experience across a broad range of networking and communications technologies. Jim is a coauthor of the Networking Simplified series, including Cisco Networking Simplified, Home Networking Simplified, and Internet Phone Services Simplified. He is also the author of the “Study Notes” section of CCNA Flash Cards and Exam Practice Pack (CCNA Self-Study, Exam #640-801), Second Edition. Jim is a former Marine Corps sergeant; he holds a bachelor’s degree in electrical engineering from N.C. State University and a master’s degree in business administration from Duke University.

Neil Anderson is the senior manager of enterprise systems engineering at Cisco Systems. Neil has more than 20 years of engineering experience including public telephone systems, mobile phone systems, Internet, and home networking. At Cisco, Neil’s focus is large corporate customers in the areas of routing and switching, wireless, security, and IP communications. Neil is a coauthor of the Networking Simplified series, including Home Networking Simplified and Internet Phone Services Simplified. Neil holds a bachelor’s degree in computer science.

This book is part of the Networking Technology Series from Cisco Press®, the only authorized publisher for Cisco Systems.

Read More Show Less

Product Details

  • ISBN-13: 9780133034868
  • Publisher: Pearson Education
  • Publication date: 8/9/2006
  • Sold by: Barnes & Noble
  • Format: eBook
  • Edition number: 1
  • Pages: 224
  • Sales rank: 1,317,164
  • File size: 44 MB
  • Note: This product may take a few minutes to download.

Meet the Author

Jim Doherty is a Director of Strategic Marketing and Mobility Solutions at Symbol Technologies. Jim coauthored Home Networking Simplified, Cisco Networking Simplified, and other key titles by Cisco Press. Jim has 13 years of experience in the telecom and networking industries.

Neil Anderson is a manager in Enterprise Systems Engineering at Cisco Systems. Neil coauthored Home Networking Simplified, published by Cisco Press. Neil has over 20 years of diverse telecom experience, including public telephone systems, mobile telephone systems, IP networks, wireless, and home networks.

Read More Show Less

Table of Contents

Introduction

Chapter 1 Tip 1: Use Firewalls

Why Do I Need Firewalls?

How Firewalls Work

Stateful Packet Inspection Firewalls

Personal Software Firewalls

Putting Firewalls to Work

Putting a Firewall Between You and the Internet

Enabling Personal Firewalls on Your Computers

Test Driving Your New Protection

What to Do If You Think You’ve Been Hacked

Sometimes, Firewalls Block the Good Stuff

Summary

Where to Go for More Information

Chapter 2 Tip 2: Secure Your Wireless Network

Why Should I Care About Wireless Network Security?

What Do I Do About Wireless Security?

Change Your Password

Do Not Advertise Your Wireless Network

Scramble Your Signal

Disable Ad-Hoc Networking

How to Do It: Securing Your Wireless Network

Change the Router’s Default Password

Stop Advertising Your Wireless Network

Enable Wireless Encryption

Disable Ad-Hoc Networking

Prevent Unintentional Roaming

Wireless Security Checklist

Summary

Where to Go for More Information

Chapter 3 Tip 3: Use Antivirus Protection

What Are Computer Viruses?

Viruses

Worms

Trojan Horses

Commonsense Approach to Computer Viruses

How Antivirus Works

Virus Detection

Virus Prevention

Inoculating Yourself Against Computer Viruses

Turning On Antivirus at Your ISP

Installing Antivirus Software on Your Computers

Windows Live OneCare

What to Do If You Think You’ve Been Infected

Summary

Where to Go for More Information

Chapter 4 Tip 4: Keep Your Software Updated

Why Software Needs to Be Updated

Updating Your Operating System

Enabling Automatic Updates

Manual Operating System Updates

Updating Your Software Programs

Using Windows Restore Points

Creating a Restore Point

Restoring Your Computer to a Restore Point

What to Do If You Think Your Operating System Has Been Compromised

Summary

Where to Go for More Information

Chapter 5 Tip 5: Lock Out Spyware and Adware

What Is Spyware and Adware?

Adware

Spyware

Are Spyware and Adware Viruses?

Preventing Spyware and Adware

Exercising Common Sense

Installing a Popup Blocker

Installing an Antispyware/Antiadware Program

What to Do If You Think You’ve Been Infected

Spyware/Adware-Removal Tools

Removing Spyware and Adware Programs Using the Installed Programs List

Summary

Where to Go for More Information

Chapter 6 Tip 6: Keep an Eye on Your Kids

What Are the Dangers Your Kids Might Encounter Online?

Pornography

Predators

Gambling

Hacking

Illegal Peer-to-Peer Sharing

Maybe I Should Rethink This Internet Thing

Preparing Kids for Being Online

Establish and Communicate the Internet Usage Policy

Making Kids Aware of Online Dangers

Avoid Giving Out Personal Information Online

Policing Kids Online

Browse in Plain Sight

Monitor and Review Your Kids’ Websites and Blogs

Check Out Your Kids’ Blogs

Review Website History

Using Parental Controls

Parental Controls at Your ISP

Parental Controls at Your Home Network Router

Parental Controls on Your Computers

What to Do If You Think Your Child Is Abusing the Rules

Activity Loggers

Summary

Where to Go for More Information

Chapter 7 Tip 7: Recognize and Avoid Phishing Scams

How Phishing Scams Work

Tricks of the Trade

How to Avoid Becoming a Victim

What to Do If You Suspect You Are the Target of a Phishing Scam

Summary

Where to Go for More Information

Chapter 8 Tip 8: Create Strong Passwords

Anatomy of a Lousy Password

Elements of a Strong Password

How to Create a Strong Password That You Can Remember

Additional Password Tips

Summary

Where to Go for More Information

Chapter 9 Tip 9: Back Up Your Files

What Should I Back Up?

Where Do I Back Up To?

How Often Should I Back Up?

Storage Method Overview

Flash Memory

External Hard Drives

Networked Storage

Online Storage

DVD or CD Storage

Summary of Storage Options

Putting It All Together

Using Windows XP Backup

Summary

Where to Go for More Information

Chapter 10 Tip 10: Use Common Sense

Urban Legends

E-Mail Stock Tips (Pump-and-Dump Scams)

Work from Home (Pyramid) Schemes

Money-Exchange Schemes

“Hot” Merchandise Scam

What to Do to Protect Yourself

Summary

Where to Go for More Information

Chapter 11 ”They Couldn’t Hit an Elephant at This Distance”

Glossary

Index

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)