找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Computer Security for the Home and Small Office; Thomas C. Greene Book 2004 Thomas C. Greene 2004 Linux.Windows.computer security.security

[复制链接]
查看: 50779|回复: 40
发表于 2025-3-21 17:11:01 | 显示全部楼层 |阅读模式
书目名称Computer Security for the Home and Small Office
编辑Thomas C. Greene
视频video
图书封面Titlebook: Computer Security for the Home and Small Office;  Thomas C. Greene Book 2004 Thomas C. Greene 2004 Linux.Windows.computer security.security
描述.Computer Security for the Home and Small Office. addresses the long-neglected security needs of everyday users in the home, company workstation, and SOHO (small office/home office) categories, with emphasis on system hardening, eliminating malware, user and Internet privacy, encryption, and data hygiene. ..The book offers comprehensive tutorials for protecting privacy, preventing system attacks and, most important, avoiding difficulties from buggy programs and software laced with hidden functions and networking capabilities. ..Furthermore, the book is packed with information about open-source products with related security strategies for Windows users. One recurrent strategy: replacing insecure closed-source applications and utilities with safer open-source alternatives, thereby eliminating numerous routes to system exploitation and privacy invasion. ..Also included is plenty of guidance for Linux users, and a full chapter weighing the advantages and disadvantages of migrating to Linux—a step that can greatly simplify computer security, even for the novice user..
出版日期Book 2004
关键词Linux; Windows; computer security; security; software
版次1
doihttps://doi.org/10.1007/978-1-4302-0711-5
isbn_softcover978-1-59059-316-5
isbn_ebook978-1-4302-0711-5
copyrightThomas C. Greene 2004
The information of publication is updating

书目名称Computer Security for the Home and Small Office影响因子(影响力)




书目名称Computer Security for the Home and Small Office影响因子(影响力)学科排名




书目名称Computer Security for the Home and Small Office网络公开度




书目名称Computer Security for the Home and Small Office网络公开度学科排名




书目名称Computer Security for the Home and Small Office被引频次




书目名称Computer Security for the Home and Small Office被引频次学科排名




书目名称Computer Security for the Home and Small Office年度引用




书目名称Computer Security for the Home and Small Office年度引用学科排名




书目名称Computer Security for the Home and Small Office读者反馈




书目名称Computer Security for the Home and Small Office读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 20:52:47 | 显示全部楼层
Genyou Wu,Paul Patton,Ben Crossience of hardening Linux. This is an especially important consideration for readers who aren’t confident in their ability to tweak system settings in a computing environment as confusing and opaque as Windows.
发表于 2025-3-22 03:09:07 | 显示全部楼层
发表于 2025-3-22 08:19:54 | 显示全部楼层
发表于 2025-3-22 10:39:36 | 显示全部楼层
https://doi.org/10.1007/978-981-97-3678-2ears of federal detention—he rarely had to bother. Mitnick is a master of . (SE): tech slang for “persuading people to act against their own interests.” In the real world, we run across social engineers every day, only we call them ..
发表于 2025-3-22 16:35:43 | 显示全部楼层
发表于 2025-3-22 19:27:07 | 显示全部楼层
Book 2004SOHO (small office/home office) categories, with emphasis on system hardening, eliminating malware, user and Internet privacy, encryption, and data hygiene. ..The book offers comprehensive tutorials for protecting privacy, preventing system attacks and, most important, avoiding difficulties from bug
发表于 2025-3-22 23:21:44 | 显示全部楼层
发表于 2025-3-23 03:05:30 | 显示全部楼层
https://doi.org/10.1007/978-981-97-3678-2last group is a small minority: any notion that the Net has been infiltrated by legions of elite blackhats is purely a product of Hollywood exaggeration and a gullible mainstream press hungry for technical wonders.
发表于 2025-3-23 07:34:53 | 显示全部楼层
https://doi.org/10.1007/978-981-97-3678-2o security than denying assistance to attackers; there are, in fact, a number of deliberate steps we can take to monitor our systems, investigate suspicious behavior, and take action. In this chapter, we’ll learn about tools of . that we can use to enhance security and thwart attacks.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-27 18:33
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表