Windows Internet Security
暫譯: Windows 網際網路安全性

Seth Fogie, Cyrus Peikari

  • 出版商: Prentice Hall
  • 出版日期: 2001-10-07
  • 定價: $1,320
  • 售價: 6.0$792
  • 語言: 英文
  • 頁數: 400
  • 裝訂: Paperback
  • ISBN: 0130428310
  • ISBN-13: 9780130428318
  • 相關分類: 資訊安全
  • 立即出貨(限量) (庫存=8)

買這商品的人也買了...

商品描述

Protect your Windows system against Internet hackers—right now!

  • Protect your Windows computer—NOW!
  • Covers Windows 2000, Me, 98, 95, and Windows XP
  • Stop sharing your files with the world
  • Install your own personal firewall—step by step
  • Block your employer from reading your private email
  • Avoid worms, Trojans, viruses, and hostile Web pages

Whether you're running Windows XP, 2000, Me, 98, or 95, if you're connected to the Internet, you're at risk—especially if you're using an "always-on" cable modem or DSL connection. Now, learn exactly how to defend yourself—even if you know nothing about Internet security!

Windows Internet Security starts by reviewing the threats to your Windows PC: what hackers know about your computer and the Internet, and how they can use that knowledge to attack you. Then, step by step, you'll plan and implement today's most powerful defenses. Discover how to:

  • Stop sharing resources you don't want to expose to the world
  • Choose and implement the right "personal firewall"
  • Protect your e-commerce transactions
  • Avoid viruses, worms, Trojans, and hostile Web pages
  • Protect your privacy and anonymity on the Web
  • Cope with today's new wireless hacking attacks
  • Respond and recover if you've already been hacked
  • Make the most of Windows XP's new computer security features

Windows Internet Security makes security comprehensible, practical-even easy! At home or at work, it's the one indispensable security book for every Windows user and administrator.

Table of Contents

Preface.
Studying the Battleground.
1. Computer Architecture and Operating System Review.

Understanding the Internals of Your Computer. Size Matters. The Hard Drive. RAM. The Processor (CPU). Cache. The Motherboard. Bus Speed/Size. The Modem. The Network Interface Card. Serial and Parallel Ports. Summary of the Computer versus Library Analogy. The Modem in Detail. Operating Systems and Internet Security. Windows 95/98/ME. Windows NT/2000/XP. Linux. Other UNIX-Based Operating Systems and Macs. Windows CE. Summary.


2. Understanding the Internet.

A Little Byte of History. The Internet Service Provider. What Is an ISP? POPs. ISP Logging. Proxy ISPs. Web Addressing Explained. URIs. URNs. URC. URLs. Internet Protocols. http. https. ftp. Other Protocols. Breaking Down the URL. The Internet Protocol Address. Domain Name Servers. URL Abuse. Web Pages: Inside and Out. Web Servers. HTML. Scripting and Codes. Malicious Coding.


3. TCP/IP.

A Computer: A House. Your Computer Ports: Your Doors and Windows. Roads and Highways: The Internet. TCP/IP: An Overview. TCP/IP: Driving Rules. CEO Analogy. TCP/IP: The Gory Details. Packets. Layers. TCP/IP Handshaking. Knowing the Enemy.


4. Know Your Enemy.

The Hacker versus the Cracker. The Script Kiddie. The Phreaker. Ethical versus Unethical Hackers. Global Hackers.


5. Hacking Techniques for Unauthorized Access.

WetWare. Social Engineering. Social Spying. Garbage Collecting. Sniffing. What is Sniffing? How Does a Sniffer Work? How Hackers Use Sniffers. How Can I Block Sniffers? How to Detect a Sniffer. Spoofing and Session Hijacking. An Example of Spoofing. Buffer Overflows. Character Manipulation and Unexpected Input Exploits. The Normal Search Engine Process. The Hacked Search Engine Process. Exploiting Web Forms.


6. Hacking Techniques for Attacks.

SYN Flooding. Smurf Attacks. System Overloads. DNS Spoofing.


7. Walk-Through of a Hacker Attack.

The Goal Stage. Walk-Through of a Hack. Information Gathering. Planning. Execution. Clean Up. Planning the Defense.


8. Building Your Defense Strategy.

Fortifying Your Defenses. Virus/Trojan Protection. Virus Scanners. Trojan Scanners. Firewalls. Hardware Firewalls. Software Firewalls. Hardware/Software Combination Firewalls. Which Firewall is Best for You? Restricting Access by IP. Restricting Access by Port (Service). Restricting Access by Protocol. Restricting Access by Keyword. Restricting Access by Application. Encryption. Encryption Details. Symmetric Encryption. Asymmetric Encryption. Putting Different Types of Encryption to the Test. Origin Verification. Secure Sockets Layer. Virtual Private Network. Disadvantages of Encryption. What Encryption Does Not Do. Recovery. Summary.


9. Personal Firewalls and Intrusion Detection Systems.

Do Personal Firewalls Really Work? The Fallacy of “Laying Low” . Why Do I Need a Personal Firewall? McAfee Personal Firewall. Norton Personal Firewall. BlackICE Defender. ZoneAlarm. Intrusion Detection Systems. Honeypots.


10. Stop Sharing Your Computer.

Network Shares. Password-Protecting Shares on Windows 95/98/ME. Removing Shares on Windows 95/98/ME. Removing Shares on Windows NT/2000/XP.


11. E-Commerce Security Overview.

Thwarting E-Criminals. Who is the Real Criminal? Stolen Goods Online. Secure Transactions.


12. Mastering Network Tools

MS-DOS. NETSTAT. Ping. TRACERT. NBTSTAT. NETVIEW. NET USE. Password Crackers.


13. Viruses, Worms, and Trojan Horses.

Viruses. A Virus Defined. MBR Virus. Macro Virus. File Infectors. Combination Viruses. Worms. Virus and Worm Prevention. I've Been Infected! Now What? Trojans. How a Trojan Works. The Backdoor Blues. Detecting and Removing Trojans. Hostile Web Pages and Scripting.


14. Malicious Code.

Programming Languages. Low-Level Languages. High-Level Languages. Scripting Languages. Programming Concepts. Program Parts. Malicious Client-Side Scripting. Denial of Service Scripts. Intrusive Access Scripts. Malicious Server-Side Scripting. PHP. ASP. Perl. The Virus/Worm. An Example of Viral Code. Moving With Stealth.


15. Privacy and Anonymity.

Cookies. Cookie #1. Cookie #2. Cookie #3. Unpleasant Cookies. Cookie #1. Cookie #2. Controlling Those Cookies. Your Online Identity. Registration Requests and Unique IDs. Online Identification. Hardware IDs. Spyware in the Workplace. Chat Programs. Proxies and Anonymity. Browser Caching.


16. Big Brother is Watching You.

Email Spying. Keeping Your Email Private. Web Page Monitoring. Defeating Corporate Web Filters. Chat Program Monitoring. Keep Your Chats Private. Spyware. Spying on the Employee. Spying on the Consumer. Spying on the Family. Government Spyware. Commentary: Ethics and Privacy. Future Trends.


17. Windows XP: New Security Features.

The Microsoft Internet Connection Firewall. Windows XP Wireless Security. 802.1x—Port-Based Network Access Control. New Windows XP Wireless Features. Microsoft's XP Hacker Test. Test Site Description. File Encryption and User Control.


18. Future Security Threats.

Mobile Computing. Wireless Network Hacking. Automated Hacking. Advanced Topics.


19. Registry Editing.

Introduction to Registry Editing. Purpose of the Registry. Parts of the Registry. Using the Registry. Backing Up the Registry. Restoring the Registry. Manipulating Registry Keys.


20. Disaster Recovery.

Creating a Boot Disk. Down but Not Out (Computer is Infected, but Still Functioning). Down and Out (Computer is Inoperable). Using FDISK/Format.


Appendix A: Common Trojan Ports.

Miscellaneous.


Appendix B: Annotated Bibliography.

On the Web. Books. Internet Search. Hacking/Security Conferences.


Glossary.
Index.

商品描述(中文翻譯)

保護您的 Windows 系統免受網路駭客攻擊—現在就開始!

- 立即保護您的 Windows 電腦!
- 涵蓋 Windows 2000、Me、98、95 和 Windows XP
- 停止與全世界分享您的檔案
- 安裝您自己的個人防火牆—逐步指導
- 阻止您的雇主閱讀您的私人電子郵件
- 避免蠕蟲、木馬病毒、病毒和惡意網頁

無論您使用的是 Windows XP、2000、Me、98 還是 95,只要您連接到網際網路,就存在風險—尤其是如果您使用的是「隨時在線」的有線調製解調器或 DSL 連接。現在,學習如何保護自己—即使您對網路安全一無所知!

《Windows 網路安全》首先回顧了對您的 Windows PC 的威脅:駭客對您的電腦和網際網路的了解,以及他們如何利用這些知識來攻擊您。然後,您將逐步計劃和實施當今最強大的防禦措施。發現如何:

- 停止分享您不想暴露於全世界的資源
- 選擇並實施合適的「個人防火牆」
- 保護您的電子商務交易
- 避免病毒、蠕蟲、木馬和惡意網頁
- 保護您的隱私和網路匿名性
- 應對當今新的無線駭客攻擊
- 如果您已經被駭,如何回應和恢復
- 充分利用 Windows XP 的新電腦安全功能

《Windows 網路安全》使安全變得易於理解、實用—甚至簡單!無論在家還是在工作,這是每位 Windows 使用者和管理員不可或缺的安全書籍。

目錄

前言。
研究戰場。
1. 電腦架構與作業系統回顧。

了解您電腦的內部結構。大小的重要性。硬碟。隨機存取記憶體 (RAM)。處理器 (CPU)。快取。主機板。匯流排速度/大小。調製解調器。網路介面卡。串列和並行埠。電腦與圖書館類比的總結。調製解調器詳解。作業系統與網路安全。Windows 95/98/ME。Windows NT/2000/XP。Linux。其他基於 UNIX 的作業系統和 Mac。Windows CE。總結。

2. 了解網際網路。

一點歷史。網際網路服務提供商。什麼是 ISP?POPs。ISP 記錄。代理 ISP。網頁地址解釋。URI。URN。URC。URL。網際網路協議。http。https。ftp。其他協議。URL 分解。網際網路協議地址。域名伺服器。URL 濫用。網頁:內外部。網頁伺服器。HTML。腳本和代碼。惡意編碼。

3. TCP/IP。

電腦:一棟房子。您的電腦埠:您的門和窗。道路和高速公路:網際網路。TCP/IP:概述。TCP/IP:駕駛規則。CEO 類比。TCP/IP:詳細內容。封包。層次。TCP/IP 握手。了解敵人。

4. 了解您的敵人。

駭客與破解者。腳本小子。電話駭客。道德駭客與不道德駭客。全球駭客。

5. 未經授權訪問的駭客技術。

WetWare。社會工程。社會間諜。垃圾收集。嗅探。什麼是嗅探?嗅探器如何工作?駭客如何使用嗅探器?我該如何阻止嗅探器?如何檢測嗅探器。欺騙和會話劫持。欺騙的例子。緩衝區溢出。字符操作和意外輸入利用。正常的搜尋引擎過程。被駭的搜尋引擎過程。利用網頁表單。

6. 攻擊的駭客技術。

SYN 洪水。Smurf 攻擊。系統過載。DNS 欺騙。

7. 駭客攻擊的逐步過程。

目標階段。駭客攻擊的逐步過程。信息收集。計劃。執行。清理。計劃防禦。

8. 建立您的防禦策略。

加強您的防禦。病毒/木馬保護。病毒掃描器。木馬掃描器。防火牆。硬體防火牆。軟體防火牆。硬體/軟體組合防火牆。哪種防火牆最適合您?按 IP 限制訪問。按埠(服務)限制訪問。按協議限制訪問。按關鍵字限制訪問。按應用程式限制訪問。加密。加密詳情。對稱加密。非對稱加密。測試不同類型的加密。來源驗證。安全套接字層。虛擬私人網路。加密的缺點。加密無法做到的事。恢復。總結。

9. 個人防火牆和入侵檢測系統。

個人防火牆真的有效嗎?「低調」的謬誤。我為什麼需要個人防火牆?McAfee 個人防火牆。Norton 個人防火牆。BlackICE Defender。ZoneAlarm。入侵檢測系統。蜜罐。

10. 停止分享您的電腦。

網路共享。在 Windows 95/98/ME 上設置密碼保護共享。在 Windows 95/98/ME 上移除共享。在 Windows NT/2000/XP 上移除共享。

11. 電子商務安全概述。

阻止電子犯罪者。真正的罪犯是誰?在線盜竊。安全交易。

12. 精通網路工具。

MS-DOS。NETSTAT。Ping。TRACERT。NBTSTAT。NETVIEW。NET USE。密碼破解工具。

13. 病毒、蠕蟲和木馬。

病毒。病毒的定義。MBR 病毒。宏病毒。檔案感染者。組合病毒。蠕蟲。病毒和蠕蟲預防。我被感染了!現在該怎麼辦?木馬。木馬如何運作。後門藍調。檢測和移除木馬。惡意網頁和腳本。

14. 惡意代碼。

程式語言。低階語言。高階語言。腳本語言。程式概念。程式部分。惡意客戶端腳本。拒絕服務腳本。侵入性訪問腳本。惡意伺服器端腳本。PHP。ASP。Perl。病毒/蠕蟲。一個病毒代碼的例子。隱秘行動。

15. 隱私和匿名性。

Cookies。Cookie #1。Cookie #2。Cookie #3。不愉快的 Cookies。Cookie #1。Cookie #2。控制這些 Cookies。您的在線身份。註冊請求和唯一 ID。在線識別。硬體 ID。工作場所的間諜軟體。聊天程式。代理和匿名性。瀏覽器快取。

16. 大哥在監視您。

電子郵件間諜。保持您的電子郵件私密。網頁監控。擊敗企業網頁過濾器。聊天程式監控。保持您的聊天私密。間諜軟體。監視員工。監視消費者。監視家庭。政府間諜軟體。評論:倫理與隱私。未來趨勢。

17. Windows XP:新安全功能。

微軟網際網路連接防火牆。Windows XP 無線安全。802.1x—基於埠的網路訪問控制。Windows XP 新的無線功能。微軟的 XP 駭客測試。測試網站描述。檔案加密和用戶控制。

18. 未來的安全威脅。

行動計算。無線網路駭客。自動駭客。進階主題。

19. 註冊編輯。

註冊編輯簡介。註冊的目的。註冊的部分。使用註冊。備份註冊。恢復註冊。操作註冊鍵。

20. 災難恢復。

創建啟動磁碟。雖然電腦感染但仍可運行。電腦無法運行。

附錄 A:常見木馬埠。

雜項。

附錄 B:註釋書目。

在網路上。書籍。網際網路搜尋。駭客/安全會議。

詞彙表。索引。