Windows Vista Security for Dummies
This indispensable guide shows you how to slam your Windows shut on vulnerabilities and security threats. You’ll find out how to use the fortress built into Vista to assess your risk, protect your kids, keep pfishers out of your bank account, and much more. You’ll also learn how to get the most out of Vista’s security features using authentication, Windows Defender, parent controls, security enhancements, firewall buttresses, wireless protections, encryption, and much more. Discover how to:
- Save money by using built-in security tools
- Audit your network
- Fine-tune your firewall
- Use all of the enhancements in Explorer 7
- Control what your kids play and where they go online
- Develop a comprehensive security plan
- Dispense security from Windows Security Center
- Reduce exposure by controlling user tasks
- Secure your digital information with RMS
- Manage accounts, groups, and shares
- Plan and implement Encrypting File System
- Avoid data theft with BitLocker
- Establish advanced security practices
Don’t leave your computer and network security to chance. Get Vista Security For Dummies and be ready for anything!
Table of Contents
Part I: Vista Security Essentials.
Chapter 1: Getting Up to Speed on Vista Security.
Chapter 2: Setting Up Your Security Plan.
Chapter 3: Dispensing Security from Windows Security Center.
Part II: Controlling Access to Systems and Data.
Chapter 4: Administering User Account Control.
Chapter 5: Protecting Your Data with Rights Management Service.
Chapter 6: Managing Accounts, Groups, and Shares.
Chapter 7: Advanced Techniques for Managing Access.
Part III:Preserving and Protecting Data.
Chapter 8: Backing Up So You Can Always Restore.
Chapter 9: Planning and Implementing Encrypting File System.
Chapter 10: Avoiding Data Theft with BitLocker.
Part IV: Guarding against Threats to Network Security.
Chapter 11: Configuring Your Firewall.
Chapter 12: Locking Down Wireless.
Chapter 13: Implementing IE7 Security Features to Limit Your Exposur.
Chapter 14: Avoiding Invasion (By Malware, Spyware, Viruses, and the Other Usual Suspects).
Part V: Establishing Advanced Security Practices.
Chapter 15: Restricting the Use of Removable Media (And More).
Chapter 16: Working with Vista Security Policies.
Part VI: The Part of Tens.
Chapter 17: Nine Security Risks and How to Thwart Them.
Chapter 18: Ten Additional Security Tools and Resources You Shouldn’t Compute Without.
Appendix A: Glossary of Vista and Security Terms.
Appendix B: Getting to Know Vista Versions (And Related Security Features).
Sign up now »
- FTLead Software EngineerSA
- FTTechnical Business AnalystNSW
- FTOS Web Applications DeveloperNSW
- FTR&D EngineerSA
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTQuality ManagerSA
- FTSenior Python DeveloperNSW
- FTFlash / ActionScript Developer - ContractNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
Businesses face a constantly evolving threat landscape. One of the greatest challenges is presented by advanced persistent threats (APTs), which are sophisticated, multi‐faceted attacks targeting a particular organisation. Mitigating the ...
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia