Электронная книга: Peter Gregory H. «Computer Viruses For Dummies»
Computer viruses—just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. Fortunately, there are ways to inoculate and protect your computer. Computer Viruses For Dummies helps you: Understand the risks and analyze your PC’s current condition Select, install, and configure antivirus software Scan your computer and e-mail Rid your computer of viruses it’s already caught Update antivirus software and install security patches Use firewalls and spyware blockers Protect handheld PDAs from viruses Adopt safe computing practices, especially with e-mail and when you’re surfing the Net Written by Peter H. Gregory, coauthor of CISSP For Dummies and Security + For Dummies, Computer Viruses For Dummies goes beyond viruses to explain other nasty computer infections like Trojan horses, HiJackers, worms, phishing scams, spyware, and hoaxes. It also profiles major antivirus software to help you choose the best program(s) for your needs. Remember, if you don’t protect your computer, not only do you risk having yourcomputer infiltrated and your data contaminated, you risk unknowingly transmitting a virus, worm, or other foul computer germ to everybody in your address book! This guide will help you properly immunize your PC with antivirus software now and install updates and security patches that are like booster shots to keep your software protected against new viruses. Издательство: "John Wiley&Sons Limited (USD)"
ISBN: 9780764579974 электронная книга Купить за 1172.25 руб и скачать на Litres |
Другие книги автора:
Книга | Описание | Год | Цена | Тип книги |
---|---|---|---|---|
CISSP For Dummies | The fast and easy way to secure your CISSP certification Are you a security professional seeking the valuable CISSP certification? Good for you! CISSP For Dummies is the ideal starting point on your… — John Wiley&Sons Limited (USD), электронная книга Подробнее... | электронная книга | ||
IT Disaster Recovery Planning For Dummies | If you have a business or a nonprofit organization, or if you’re the one responsible for information systems at such an operation, you know that disaster recovery planning is pretty vital. But… — John Wiley&Sons Limited (USD), электронная книга Подробнее... | электронная книга |
См. также в других словарях:
Hacker (computer security) — This article is part of a series on … Wikipedia
Software tools for molecular microscopy — There are a large number of software tools or software applications that have been specifically developed for the field sometimes referred to as molecular microscopy or cryo electron microscopy or cryoEM. Several special issues of the Journal of… … Wikipedia
Peter H. Gregory — Peter H. Gregory, CISA, CISSP is an American information security manager, computer security specialist, and writer. He is the author of several books on computer security and information technology. Biography Gregory is a member of the Board of… … Wikipedia
Firefox — For other uses, see Firefox (disambiguation). Phoenix (web browser) redirects here. For the Phoenix browser based on tkWWW, see tkWWW. Firefox … Wikipedia
Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… … Wikipedia
List of conspiracy theories — The list of conspiracy theories is a collection of the most popular unproven theories related but not limited to clandestine government plans, elaborate murder plots, suppression of secret technology and knowledge, and other supposed schemes… … Wikipedia