|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn297576143 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
090109s2009 inua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCQ
|d COO
|d CEF
|d OCLCQ
|d NHM
|d DEBSZ
|d OCLCQ
|d OCLCO
|d OCLCA
|d OCLCF
|d OCLCQ
|d YDX
|d OCLCA
|d OCLCQ
|d OCLCO
|d OCLCA
|d AU@
|d OCLCA
|d OCLCQ
|d WYU
|d UAB
|d VT2
|d OCLCQ
|d OCLCO
|d LDP
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1044283101
|a 1056356034
|a 1060806483
|a 1064017574
|a 1075567403
|a 1103271233
|a 1129355618
|a 1152972003
|a 1156841910
|a 1192350406
|a 1240534745
|
020 |
|
|
|a 9780789736727
|
020 |
|
|
|a 0789736721
|
020 |
|
|
|a 0132714841
|
020 |
|
|
|a 9780132714846
|
029 |
1 |
|
|a CHBIS
|b 006148515
|
029 |
1 |
|
|a CHVBK
|b 171205804
|
029 |
1 |
|
|a DEBSZ
|b 355432188
|
029 |
1 |
|
|a AU@
|b 000073552454
|
035 |
|
|
|a (OCoLC)297576143
|z (OCoLC)1044283101
|z (OCoLC)1056356034
|z (OCoLC)1060806483
|z (OCoLC)1064017574
|z (OCoLC)1075567403
|z (OCoLC)1103271233
|z (OCoLC)1129355618
|z (OCoLC)1152972003
|z (OCoLC)1156841910
|z (OCoLC)1192350406
|z (OCoLC)1240534745
|
037 |
|
|
|a CL0500000030
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b W3393 2009
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Walker, Andy
|q (Andy G.),
|d 1967-
|
245 |
1 |
0 |
|a Windows lockdown! :
|b your XP and Vista guide against hacks, attacks, and other Internet mayhem /
|c Andy Walker.
|
260 |
|
|
|a Indianapolis, Ind. :
|b Que,
|c ©2009.
|
300 |
|
|
|a 1 online resource (xvi, 454 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a pt. I. Security Basics: Some Very Real Threats -- 1. Viruses: Attack of the Malicious Programs -- 2. Spyware: Overrun By Advertisers, Hijackers, and Opportunists -- 3. Rootkits: Sneaky, Stealthy Toolboxes -- 4. Hackers: There's a Man In My Machine -- 5. Identity Thieves and Phishers: Protect Your Good Name and Bank Account -- 6. Spam: Unwanted Email from Hell -- 7. Wireless Network Snoops: Lock Down Your Wi-Fi Network -- pt. II. Hardcore Help for Safe and Secure Computing -- 8. Damage Control -- How to Remove Viruses and Spyware Infections -- 9. Ground Up Security -- Wipe Your Hard Drive and Build a Secure Windows PC from the Ground Up -- 10. Ongoing Maintenance: Fend Off Future Threats! -- pt. III. Tools for Maintenance and Protection -- 11. Selecting Software: Steals, Deals, and Software Duds -- 12. Tools of the Trade: Security Products You Should Own -- Glossary: Computer Threat Lingo.
|
520 |
1 |
|
|a "This book defines all the threats an average household might face and provides strategies to turn novice and basic users into adept home security experts, making you safer and more secure from cyber criminals." "We start off with plain English definitions for security mumbo jumbo, and then we dig in with step-by-step instructions to help you cut your exposure in less than 10 minutes! Finally, we provide steps for more involved security measures that you can do in a weekend." "We also take an in-depth look at the security measures Microsoft put in Windows Vista. We also look at how Vista responds to the key threats. It teaches you how to tweak the system and make Microsoft's new security features - like the User Access Control - less annoying and helps you adjust the system to be usable. It shows you how to set up Vista to protect your system from your kids - the biggest security hazard to your computer."--Jacket
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Microsoft Windows (Computer file)
|
630 |
0 |
7 |
|a Microsoft Windows (Computer file)
|2 blmlsh
|
630 |
0 |
7 |
|a Microsoft Windows (Computer file)
|2 fast
|0 (OCoLC)fst01367862
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer security.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
776 |
0 |
8 |
|i Print version:
|a Walker, Andy (Andy G.), 1967-
|t Windows lockdown!.
|d Indianapolis, Ind. : Que, ©2009
|w (DLC) 2008028343
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780789736727/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37826288
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14851046
|
994 |
|
|
|a 92
|b IZTAP
|