Desktop Witness: The Do's & Don'ts of Personal Computer Security

Michael A. Caloyannides

  • 出版商: Wiley
  • 出版日期: 2002-06-14
  • 售價: $1,050
  • 貴賓價: 9.8$1,029
  • 語言: 英文
  • 頁數: 384
  • 裝訂: Paperback
  • ISBN: 0471486574
  • ISBN-13: 9780471486572
  • 相關分類: 資訊安全
  • 下單後立即進貨 (約5~7天)

商品描述

Do you trust your computer?
You shouldn't.

Personal computers are now part of the furniture in homes around the world. We use them for generating, storing and communicating documents and images; we talk to friends and family via email and surf the Web without giving too much thought to the security of our personal information. Unfortunately hacking and computer security are issues which affect all computer users, not just big corporations.

What is a desktop witness?
Your computer stores a record of every document you create, every e-mail you write or receive, which sites you visit on the Internet, even attachments which you don't open.

An unattended computer may reveal your secrets if you leave security vulnerabilities unattended to. It may 'let in' outsiders through your IR port. It 'whispers' behind your back when you are online. Detectable radiation gives away the contents of your screen. Eavesdroppers can hear conversations through your microphone. Your computer remembers everything.

What can you do?
This straight-talking guide, with its easy-to-follow instructions will enable you to regain control and protect your personal information. It will show you the virtues of computer-anonymity, by making you aware of what might motivate people to access your computer in the first place, and it will help you free-up valuable memory by showing you how to really delete the files your computer stores without your knowledge.

A valuable read for any computer user and absolutely essential for any individual, company or practice with information to protect.

Table of Contents

Preface

Acknowledgment

The Need is Very Real: Author's Perspective

So You Want to Encrypt: Don't Hurt Your Own Interests by Doing So

Protect What and From Whom? The Answer Determines What You Should and Should Not Do

Effective Protection for Computers Not Connected to Networks

Effective Protection for Computers Connected to the Internet or other Networks

Encrypted Telephony

Legal Issues

In Conclusion

Appendices

Glossary

Index