HomeGroupsTalkZeitgeist
Hide this

Results from Google Books

Click on a thumbnail to go to Google Books.

Your Ultimate Security Guide: Windows 7…
Loading...

Your Ultimate Security Guide: Windows 7 Edition

by Justin Carroll

MembersReviewsPopularityAverage ratingConversations
1None3,689,591NoneNone
Recently added byjanoorani24

None.

None
Loading...

Sign up for LibraryThing to find out whether you'll like this book.

No current Talk conversations about this book.

No reviews
no reviews | add a review
You must log in to edit Common Knowledge data.
For more help see the Common Knowledge help page.
Series (with order)
Canonical title
Original title
Alternative titles
Original publication date
People/Characters
Important places
Important events
Related movies
Awards and honors
Epigraph
Dedication
First words
Quotations
Last words
Disambiguation notice
Publisher's editors
Blurbers
Publisher series
Original language

References to this work on external resources.

Wikipedia in English

None

Book description
Haiku summary

Amazon.com Product Description (ISBN 150864778X, Paperback)

Your Ultimate Security Guide: Windows 7 Edition is intended to help the layman move beyond the basic computer security techniques and develop a comprehensive digital security perimeter. Written in plain English, Your Ultimate Security Guide: Windows 7 Edition takes a step-by-step approach to enhancing computer security with the most popular operating system in the world, Windows 7. Your Ultimate Security Guide will also help you reclaim some privacy on the internet.
Though this book is centered around the Windows 7 operating system, most of the techniques provided in the book are applicable to all internet and computer users. Some of these techniques readers of this book will understand how to employ include how to:
Harden the Windows 7 operating system and use anti-virus applications to defend against common threats,
Use password managers to create and use strong usernames and passwords, and different ones on each account, and employ two-factor authentication.
Use checksums to verify the integrity of downloaded programs before trusting them.
Use a multi-layered approach to encryption to secure your important files and backups.
Securely delete files and clean your system to defend it against forensic attacks and keep it running at peak performance.
Lock down your Wi-Fi network and secure your internet traffic using best practices, virtual private networks, and Tor.
Protect your sensitive online accounts through a comprehensive, systematic approach, and employ best practices to lower online exposure and minimize attack surface.
Though many of the settings in this work will pertain to iPods and iPads, this work is primarily intended for iPhone users.

(retrieved from Amazon Mon, 31 Aug 2015 10:52:14 -0400)

No library descriptions found.

Quick Links

Swap Ebooks Audio

Popular covers

Rating

Average: No ratings.

Is this you?

Become a LibraryThing Author.

 

About | Contact | Privacy/Terms | Help/FAQs | Blog | Store | APIs | TinyCat | Legacy Libraries | Early Reviewers | Common Knowledge | 120,656,891 books! | Top bar: Always visible