รูปภาพสินค้า รหัส9780764577697
9780764577697
-
ผู้เขียนED TITTEL

ส่วนลด 0 %
ราคาปก 1,080.00 บาท
ราคาสุทธิ 1,080.00 บาท
Bookmark and Share
รายละเอียดหนังสือ
รหัสสินค้า: 9780764577697
จำนวน: 367 หน้า
ขนาดรูปเล่ม: 188 x 235 x 20 มม.
น้ำหนัก: 580 กรัม
เนื้อในพิมพ์: ขาวดำ 
ชนิดปก: ปกอ่อน 
ชนิดกระดาษ: -ไม่ระบุ 
หน่วย: เล่ม 
สำนักพิมพ์: Wiley Publishing, Inc. 
:: เนื้อหาโดยสังเขป
Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer—like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by following Ed Tittel's advice, you can learn how invasions occur, spot an infestation, repair damage that's already done, and slam the door on those who want to hijack your PC—along with your wallet.
Here's how you can
- Learn to recognize when a Trojan horse, a virus, adware,
or spyware has invaded your PC
- Get the tools that can cure an infection
- Dig into the Windows Registry to remove the nastiest of
bugs
- Prevent a recurrence with personal firewalls and protective
software
- Deal with the onslaught of spam
- Keep your defenses up-to-date
Give it the boot
If you believe you've caught something and you're willing to kiss everything goodbye that you've added to or changed ... since the last time you booted up your computer ... try this. While Windows is first booting up, hit the F8 key .... Choose the Last Known Good Configuration option, and Windows should boot running the version of the Registry that existed the last time your system booted—that is, before you got infected.

:: สารบัญ
Part I Welcome to the jungle!
Chapter 1 Unwelcome intruders seeking entry 3
Chapter 2 Understanding malware 17

Part II How good PCs go bad
Chapter 3 Methods of insertion and delivery 45
Chapter 4 Detecting and repairing PC infestations 59

Part III The particles of protection
Chapter 5 Personal firewalls 85
Chapter 6 Pop-up blockers 125
Chapter 7 Anti-spyware and anti-adware programs 141
Chapter 8 Anti-virus programs 165
Chapter 9 Spam blockers 187

Part IV Commonsense rules for safe computing
Chapter 10 Practicing e-mail safety 221
Chapter 11 Practicing Web safety 243
Chapter 12 Practicing system safety 271

Part V The habit of security
Chapter 13 Safety is a matter of routine 297
Chapter 14 Safety requires constant vigilance 311