Table of contents for Defeating the hacker : a non-technical introduction to computer security / Robert Schifreen.

Bibliographic record and links to related information available from the Library of Congress catalog.

Note: Contents data are machine generated based on pre-publication provided by the publisher. Contents may have variations from the printed book or be incomplete or contain other coding.

Chapter 1	Introduction
Chapter 2	A hacker is made
Chapter 3	Preparation and Planning
Chapter 4	International Laws and Standards
Chapter 5	Passwords and Beyond
Chapter 6	Your Information Security Policy
Chapter 7	Security Awareness Training
Chapter 8	Patch Management
Chapter 9	Windows Workstation Security
Chapter 10	Basic Server Security
Chapter 11	Understanding Firewalls
Chapter 12	Protecting Your Web Site
Chapter 13	Wireless Networking
Chapter 14	Penetration Testing & Vulnerability Scanning
Chapter 15	Security Through Obscurity
Chapter 16	Windows Vista
Chapter 17	Email
Chapter 18	The Curse of Spam
Chapter 19	Viruses
Chapter 20	Spyware, Adware and Diallers
Chapter 21	Piracy
Chapter 22	File Sharing and ?P2P?
Chapter 23	Backups and Archives
Chapter 24	Preventing Internet Misuse
Chapter 25	Document Security
Chapter 26	Data Theft
Chapter 27	Encryption
Chapter 28	Employees? Own Computers
Chapter 29	How Hackers Use Search Engines
Chapter 30	Denial of Service Attacks
Chapter 31	Provisioning and Identity Management
Chapter 32	Data Interception
Chapter 33	Out of the Office
Chapter 34	Social Engineering
Chapter 35	E-Commerce Fraud
Chapter 36	Intrusion Detection Systems
Chapter 37	Outsourcing
Chapter 38	Securing your Premises
Chapter 39	Forensics
Chapter 40	Planning for the Worst
Chapter 41	Hardware Theft
Chapter 42	Let?s Be Careful Out There

Library of Congress Subject Headings for this publication:

Computer security.