chapter 27
Securing Computers
“Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat.”
—SUN TZU, THE ART OF WAR
In this chapter, you will learn how to
■ Explain the threats to your computers and data
■ Describe key security concepts and technologies
■ Explain how to protect computers from network threats
Your PC is under siege. Through your PC, malicious people can gain valuable information about you and your habits. They can steal your files. They can run programs that log your keystrokes and thus gain account names and passwords, credit card information, and more. They can run software ...
Get Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting PCs, Seventh Edition (Exams 220-1101 & 220-1102), 7th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.