Table of Contents
Introduction to Computer Security
Part I – Protecting Your Computer Hardware
- Chapter 1 – Protecting Your Computer Hardware
- Chapter 2 – Climate and Environment
- Chapter 3 – Backing Up Your Data
- Chapter 4 – UPS Uninterruptible Power Supply
Part II – Controlling Access to Your Computer
- Chapter 5 – Password Protection & Management
- Chapter 6 – Identity Theft
- Chapter 7 – Physical Computer Access
- Chapter 8 – Securing Microsoft Windows
Part III – Safeguarding Your Email Communications
Part IV – Securing Your Computer System
- Chapter 12 – Firewalls
- Chapter 13 – Networking Security
- Chapter 14 – Securing Your Browser
- Chapter 15 – Antivirus Software
- Chapter 16 – Internet Hoaxes
- Chapter 17 – Spyware
- Chapter 18 – Threats/Attacks/Hackers & Crackers
- Chapter 19 – Wireless Security
- Chapter 20 – Guide to Linux Security
- Introduction to Linux Security
- Some Linux Security Precautions
- When Your Linux System Has Already Been Compromised
- Linux Operating System Security
- Linux File System Security
- Perimeter Security in Linux
- Security Tools
- Network Vulnerability Scanners
- Linux Firewalls
- Portscan Detection Tools
- General Security Tips
- Linux Security Glossary