Fr. 85.00

Personal Internet Security Guidebook - Keeping Hackers and Crackers Out of Your Home

English · Paperback / Softback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

Informationen zum Autor Timothy Speed is an infrastructure and security architect for Lotus Professional Services (LPS), an IBM company. Tim has been involved in Internet and messaging security for the last 8 years. He has assisted with the Domino infrastructure at the Nagano Olympics and the Lotus Notes systems for the Sydney Olympics. Certifications include MCSE, VCA (VeriSign Certified Administrator), Lotus Domino CLP Principal Administrator, and Lotus Domino CLP Principal Developer. He and Juanita Ellis are the co-authors of books on Internet security and e-business. Juanita Ellis has been at the forefront in working with corporations in the areas of convergence, computer Security and e-business. Some of these companies include Sony, JCPenney, SWBell, Boeing, Xerox, Bell Atlantic, MCI, Citibank and Toyota. Currently, she works with companies in helping deploy voice and data networks, converged solutions, VPN security and call center applications. In addition, she was a technical manager at Lotus/IBM for the southern, mid-Atlantic, and eastern regions of the United States. As a technical manager, she was responsible for designing and architecting enterprise-wide applications that integrated with enterprise resource planning systems, Internet technologies, and relational and transaction-based systems. She is currently an independent consultant. Steffano Korper and Juanita Ellis are experts in cutting edge technologies, both as university lecturers and industry leaders. Lectures and programs have been conducted at the University of Maryland, University of Texas, Southern Methodist University, and University of California, Los Angeles. Nationally recognized corporations and organizations have requested their expertise in developing and deploying e-commerce solutions in both business-to-business and business-to-consumer commerce. In 1998, they developed the E-Commerce Program. Program details may be found at http://www.going-beyond-et.com. They have been featured on local and national radio shows, including CNN, Daybreak USA, Computer Daze, and Business Day. They also have been interviewed by publications such as Entrepreneur Magazine.Steffano Korper holds a B.S. in Business and Management and an M.S. in Information Systems.Juanita Ellis holds a B.S. in Business and Management and an M.S. in Information Systems. Currently, she is working on a Doctorate in Electrical Engineering Communications at George Washington University.Korper and Ellis continue to rise in visibility in the world of E-Commerce. Their courses have expanded from Southern Methodist University and University of California, Los Angeles to dozens of short courses at major corporations, including Motorola and Sony. Following the success of "The Internet Security Guidebook," the authors present a book specifically addressing security for home computers and traveling notebooks. (Computers--Security) Zusammenfassung A guide to protecting your computer(s) on the Internet. It shows you how to keep your computer safe in the hotel room as well as on the hotel network. It features a comprehensive list of vendors and services. Introduction Virus Worms Trojan Port Scanning File Share Attacks DOS Operating Systems (OS) Attacks Scams Chapter 1 - The Internet Beginning of TCP/IP TCP/IP and the Internet OK, Back to Reality Why Ethernet? Chapter 2 - Got DSL, Got Cable, May Have Trouble (Connecting to the Internet today) The Internet and the Home User The Personal Computer at Home: The Business Computer at Home: Connection Types Dial-Up ISDN DSL Cable Modem Chapter 3 - Connecting Your Home Network to the Internet Connection Types Network Interface Cards Setting Up the NIC HUB Routers What about Networking my MAC? Personal Firewalls Chapter 4 - Securing Your DSL, Cable Modem and Dial Up Connection Virus Review Law Software Attacks Against You and Your Pets Good Security Practices List of Death The Approach A Qui...

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.