Network Security for Dummies is a hands-on guide to securing your network, no matter what size it is. The book shows you how to secure all the different devices, including computers, routers, and phones, on your network and how to protect your network from intruders. You’ll also find out how to secure Wi-Fi networks and how to protect yourself from viruses.
How does Network Security for Dummies relate to other For Dummies books?
Network Security for Dummies is part of the popular For Dummies technology book series from Wiley. Other networking books in this series include Networking All-in-One Desk Reference For Dummies by Doug Lowe, Wireless Home Networking For Dummies by Kathy Ivens, and Wi-Fi All-in-One For Dummies by John Wiley & Sons Publishing. The Wi-Fi Alliance created the Wi-Fi Protected Setup (WPS) authentication standard that allows people to set up wireless networks easily. Authors of these For Dummies books have been involved in the creation of the WPS standard.
Who should read this book?
Network Security for Dummies is for home users and small business owners. Especially, those who want to protect their computers and networks from intruders without spending a lot of money or having any technical expertise. This book will also appeal to people who have an interest in wireless networking but don’t know where to start
What do you need to get started?
Networking is all about computers communicating with each other, so you’ll need a computer and a network connection. You can use a network cable or you can use a wireless connection. If you’re using a cable, you’ll also need an Ethernet card or USB-to-Ethernet adapter for each computer or device on the network. If you’re using a wireless network, you’ll need to make sure that the devices on your network support Wi-Fi. You can find out more about wireless networking in Wi-Fi All-in-One For Dummies, by John Wiley & Sons Publishing.
What makes this book different from others?
You don’t have to be a technical expert to use this book! The book is in plain English, so anyone can understand it. In addition, the book is full with practical advice and hands-on instructions that make it easy to set up and secure your network.
Reusability: This resource includes some reusable elements, such as an image of an organization’s data access processes on page 30, a list of subnets in a network on page 78, and a sample network diagram on page 87.
This resource includes some reusable elements, such as an image of an organization’s data access processes on page 30, a list of subnets in a network on page 78, and a sample network diagram on page 87. Tone and style: This resource uses direct instructional language.
This resource uses direct instructional language. Target audience: This resource is for students who want to learn about information security principles.
This resource is written for students who want to learn about information security principles. Type of assessment: The activities require the student to comprehend and apply knowledge and skills learned in the activity. There is no testing involved.
The activities require the student to comprehend and apply knowledge and skills learned in the activity. There is no testing involved. Estimated time to complete: 30 minutes