Электронная книга: Peter Gregory H. «Computer Viruses For Dummies»

Computer Viruses For Dummies

Computer viruses—just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. Fortunately, there are ways to inoculate and protect your computer. Computer Viruses For Dummies helps you: Understand the risks and analyze your PC’s current condition Select, install, and configure antivirus software Scan your computer and e-mail Rid your computer of viruses it’s already caught Update antivirus software and install security patches Use firewalls and spyware blockers Protect handheld PDAs from viruses Adopt safe computing practices, especially with e-mail and when you’re surfing the Net Written by Peter H. Gregory, coauthor of CISSP For Dummies and Security + For Dummies, Computer Viruses For Dummies goes beyond viruses to explain other nasty computer infections like Trojan horses, HiJackers, worms, phishing scams, spyware, and hoaxes. It also profiles major antivirus software to help you choose the best program(s) for your needs. Remember, if you don’t protect your computer, not only do you risk having yourcomputer infiltrated and your data contaminated, you risk unknowingly transmitting a virus, worm, or other foul computer germ to everybody in your address book! This guide will help you properly immunize your PC with antivirus software now and install updates and security patches that are like booster shots to keep your software protected against new viruses.

Издательство: "John Wiley&Sons Limited (USD)"

ISBN: 9780764579974

электронная книга

Купить за 1172.25 руб и скачать на Litres

Другие книги автора:

КнигаОписаниеГодЦенаТип книги
CISSP For DummiesThe fast and easy way to secure your CISSP certification Are you a security professional seeking the valuable CISSP certification? Good for you! CISSP For Dummies is the ideal starting point on your… — John Wiley&Sons Limited (USD), электронная книга Подробнее...2926.13электронная книга
IT Disaster Recovery Planning For DummiesIf you have a business or a nonprofit organization, or if you’re the one responsible for information systems at such an operation, you know that disaster recovery planning is pretty vital. But… — John Wiley&Sons Limited (USD), электронная книга Подробнее...2340.77электронная книга

См. также в других словарях:

  • Hacker (computer security) — This article is part of a series on …   Wikipedia

  • Software tools for molecular microscopy — There are a large number of software tools or software applications that have been specifically developed for the field sometimes referred to as molecular microscopy or cryo electron microscopy or cryoEM. Several special issues of the Journal of… …   Wikipedia

  • Peter H. Gregory — Peter H. Gregory, CISA, CISSP is an American information security manager, computer security specialist, and writer. He is the author of several books on computer security and information technology. Biography Gregory is a member of the Board of… …   Wikipedia

  • Firefox — For other uses, see Firefox (disambiguation). Phoenix (web browser) redirects here. For the Phoenix browser based on tkWWW, see tkWWW. Firefox …   Wikipedia

  • Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… …   Wikipedia

  • List of conspiracy theories — The list of conspiracy theories is a collection of the most popular unproven theories related but not limited to clandestine government plans, elaborate murder plots, suppression of secret technology and knowledge, and other supposed schemes… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»