See how your identity can be stolen, how spyware, airport security systems, and video surveillance works and more!
Preston Gralla is the award-winning author of more than 30 books, including How the Internet Works, Complete Idiot's Guide to Internet Privacy and Security, Complete Idiot's Guide to Protecting Your Child Online, and How Wireless Works. He has written frequently about security issues, computer technology, the Internet, and has been a columnist for many magazines, Web sites and newspapers, including USA Today, PC Magazine, Los Angeles Times, Dallas Morning News, Boston Magazine, PC/Computing, CNet/ZDNet, and FamilyPC.
Introduction
p. viii
Internet Security
p. 2
How the Internet Works
p. 8
How Hackers Break Into Your PC--and How to Protect Against Them
p. 14
How Spyware and Anti-Apyware Work
p. 22
How Websites Invade Your Privacy
p. 42
The Dangers of Internet Search
p. 52
How "Phishing" Attacks Can Steal Your Identity--and How to Protect Against Them
p. 58
How Zombies and Trojan Horses Attack You--and How to Protect Against Them
p. 66
The Security Dangers in Browsers
p. 76
How Worms and Viruses Do Their Damage--and How to Protect Against Them
p. 82
Wi-Fi Security Dangers and Protectionis
p. 90
Bluetooth Security Dangers
p. 110
How Instant Messages Pests Work
p. 116
How Spam Works--and How to Fight It
p. 126
How Denial-of-Service Attacks Bring Down Websites
p. 142
How Virtual Private Networks and Encryption Keep You Safe
p. 150
How Web Blocking and Parental Controls Work
p. 160
How Personal Firewalls and Proxy Servers Protect Your
p. 166
Personal Privacy and Security
p. 178
How Identity Theft Works
p. 182
Credit Card Security
p. 190
The Dangers of Data Mining
p. 198
The Dangers of Workplace Surveillance
p. 204
How Cell Phones Can Be Hacked
p. 210
How Biometrics Works
p. 218
How Radio Frequency ID Can Invade Your Pirvacy
p. 224
How Location Tracking Works
p. 230
How DNA Matching Works
p. 236
How Airport Scanners and Screening Systems Work
p. 242
The Federal Government, Privacy, and Electronic Surveillance
p. 248
How Wiretapping and Lie Detectors Work
p. 256
Index
p. 264
Table of Contents provided by Publisher. All Rights Reserved.
What is included with this book?
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.
Please wait while the item is added to your bag...
×
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description,
with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.