search for books and compare prices
Tables of Contents for The Personal Internet Security Guidebook
Chapter/Section Title
Page #
Page Count
Foreword
xi
 
Acknowledgments
xv
 
Company Copyright Notices and Statements
xvii
 
Warnings and Disclaimers
xxiv
 
Introduction
1
1
Virus
2
1
Worms
3
1
Trojan Horse
3
1
Port Scanning
4
1
File Share Attacks
4
1
DOS
4
1
Operating Systems (OS) Attacks
4
1
Scams
5
2
The Internet
7
12
Introduction
7
4
The Beginning of TCP/IP
11
1
TCP/IP and the Internet
12
2
Okay, Back to Reality
14
3
Why Ethernet?
17
2
Got DSL, Got Cable, May Have Trouble (Connecting to the Internet Today): The Internet and the Home User
19
14
The Personal Computer at Home
22
2
The Business Computer at Home
24
2
Connection Types (You Can't Get High on POTS)
26
7
Dial-Up
26
1
ISDN
27
1
DSL
28
2
Cable Modem
30
3
Connecting Your Home Network to the Internet
33
14
Connection Types
33
1
Network Interface Cards
34
2
Setting Up the NIC
36
1
HUB
37
2
Routers
39
4
What about Networking my MAC?
43
1
Personal Firewalls
43
4
Securing Your DS, Cable Modem, and Dial-Up Connection
47
34
Virus Review
47
1
Law
47
1
Software
48
1
Attacks against You and Your Pets
48
1
Good Security Practices
49
1
The Approach
50
16
Scenario One
52
1
Scenario Two
53
1
Scenario Three
54
10
Scenario Four
64
2
A Quick Overview of a Wireless Home Network
66
1
Network Card for the PC
67
1
The Access Point
68
1
Operating Range
68
1
Dial-up Configuration Settings
69
6
WinIPCfg
75
2
IPConfig
77
1
Junk and Spam
78
3
The Junk
78
1
The ``Spam''
79
2
Physical Security and Insurance
81
6
Where Are the Risks?
82
1
Theft-Prevention Devices
82
2
Alarms
82
1
Antitheft Devices
83
1
Security Enclosures
83
1
Automatic Alert System
83
1
Other Considerations
83
1
Insurance
84
2
PC Security Check List
86
1
Data Protection
87
6
Windows 2000 EFS
87
1
A Vendor Solution (Gatekeeper™)
88
2
Smart Cards
90
3
Keep Your Data Private
93
8
Who Is Keeping Us Safe?
94
1
How Are You Being Tracked?
94
5
The FBI and Carnivore
99
1
Privacy Tools
99
1
Privacy References
100
1
Encryption For Your PC
101
18
A History of Cryptography
101
2
Key Types
103
1
How a Public-Private Encryption System Works
104
5
RSA: Public and Private Keys
104
2
PGP
106
1
Digital Signatures
107
1
S/MIME
107
1
Digital Certificates
107
1
How It All Works
107
2
Now the Packet Sniffer
109
1
Securing the Link with Secure Sockets Layer (SSL)
110
2
Using and Managing Certificates
112
5
Reference Books about Encryption
117
2
Appendix I---Security Hardware and Software Reference Section
119
44
A1.1 Encryption
119
3
A1.2 Filters
122
1
A1.3 General Protections
123
17
A1.4 Personal Firewall
140
7
A1.5 Physical Security
147
4
A1.6 User Authentication
151
6
A1.7 Virus Protection
157
6
Appendix II---TCP/IP Reference
163
26
A2.1 IP Address Classes
171
4
A2.2 Domains
175
1
A2.3 ARP and Routing
176
3
A2.4 Ports
179
3
A2.5 DHCP
182
7
Glossary
189
10
Index
199