Cover image for How personal and internet security works
Title:
How personal and internet security works
Personal Author:
Series:
How it works
Publication Information:
Indianapolis, IN : Que Publishing, 2006
ISBN:
9780789735539

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010113743 HV6773 G72 2006 Open Access Book Book
Searching...
Searching...
30000010122582 HV6773 G72 2006 Open Access Book Book
Searching...

On Order

Summary

Summary

This text shows the many dangers faced by those who use the Internet to send or receive email, surf the Web, conduct personal business, use a credit card, or even travel to airports. It also illustrates how those dangers can be solved.


Author Notes

Preston Gralla is the award-winning author of more than 30 books, including How the Internet Works, Complete Idiot's Guide to Internet Privacy and Security, Complete Idiot's Guide to Protecting Your Child Online , and How Wireless Works . He has written frequently about security issues, computer technology, the Internet, and has been a columnist for many magazines, Web sites and newspapers, including USA Today, PC Magazine, Los Angeles Times, Dallas Morning News, Boston Magazine, PC/Computing, CNet/ZDNet, and FamilyPC.


Table of Contents

Introductionp. viii
Part 1 Internet Securityp. 2
Chapter 1 How the Internet Worksp. 8
Chapter 2 How Hackers Break Into Your PC--and How to Protect Against Themp. 14
Chapter 3 How Spyware and Anti-Apyware Workp. 22
Chapter 4 How Websites Invade Your Privacyp. 42
Chapter 5 The Dangers of Internet Searchp. 52
Chapter 6 How "Phishing" Attacks Can Steal Your Identity--and How to Protect Against Themp. 58
Chapter 7 How Zombies and Trojan Horses Attack You--and How to Protect Against Themp. 66
Chapter 8 The Security Dangers in Browsersp. 76
Chapter 9 How Worms and Viruses Do Their Damage--and How to Protect Against Themp. 82
Chapter 10 Wi-Fi Security Dangers and Protectionisp. 90
Chapter 11 Bluetooth Security Dangersp. 110
Chapter 12 How Instant Messages Pests Workp. 116
Chapter 13 How Spam Works--and How to Fight Itp. 126
Chapter 14 How Denial-of-Service Attacks Bring Down Websitesp. 142
Chapter 15 How Virtual Private Networks and Encryption Keep You Safep. 150
Chapter 16 How Web Blocking and Parental Controls Workp. 160
Chapter 17 How Personal Firewalls and Proxy Servers Protect Yourp. 166
Part 2 Personal Privacy and Securityp. 178
Chapter 18 How Identity Theft Worksp. 182
Chapter 19 Credit Card Securityp. 190
Chapter 20 The Dangers of Data Miningp. 198
Chapter 21 The Dangers of Workplace Surveillancep. 204
Chapter 22 How Cell Phones Can Be Hackedp. 210
Chapter 23 How Biometrics Worksp. 218
Chapter 24 How Radio Frequency ID Can Invade Your Pirvacyp. 224
Chapter 25 How Location Tracking Worksp. 230
Chapter 26 How DNA Matching Worksp. 236
Chapter 27 How Airport Scanners and Screening Systems Workp. 242
Chapter 28 The Federal Government, Privacy, and Electronic Surveillancep. 248
Chapter 29 How Wiretapping and Lie Detectors Workp. 256
Indexp. 264