Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010113743 | HV6773 G72 2006 | Open Access Book | Book | Searching... |
Searching... | 30000010122582 | HV6773 G72 2006 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
This text shows the many dangers faced by those who use the Internet to send or receive email, surf the Web, conduct personal business, use a credit card, or even travel to airports. It also illustrates how those dangers can be solved.
Author Notes
Preston Gralla is the award-winning author of more than 30 books, including How the Internet Works, Complete Idiot's Guide to Internet Privacy and Security, Complete Idiot's Guide to Protecting Your Child Online , and How Wireless Works . He has written frequently about security issues, computer technology, the Internet, and has been a columnist for many magazines, Web sites and newspapers, including USA Today, PC Magazine, Los Angeles Times, Dallas Morning News, Boston Magazine, PC/Computing, CNet/ZDNet, and FamilyPC.
Table of Contents
Introduction | p. viii |
Part 1 Internet Security | p. 2 |
Chapter 1 How the Internet Works | p. 8 |
Chapter 2 How Hackers Break Into Your PC--and How to Protect Against Them | p. 14 |
Chapter 3 How Spyware and Anti-Apyware Work | p. 22 |
Chapter 4 How Websites Invade Your Privacy | p. 42 |
Chapter 5 The Dangers of Internet Search | p. 52 |
Chapter 6 How "Phishing" Attacks Can Steal Your Identity--and How to Protect Against Them | p. 58 |
Chapter 7 How Zombies and Trojan Horses Attack You--and How to Protect Against Them | p. 66 |
Chapter 8 The Security Dangers in Browsers | p. 76 |
Chapter 9 How Worms and Viruses Do Their Damage--and How to Protect Against Them | p. 82 |
Chapter 10 Wi-Fi Security Dangers and Protectionis | p. 90 |
Chapter 11 Bluetooth Security Dangers | p. 110 |
Chapter 12 How Instant Messages Pests Work | p. 116 |
Chapter 13 How Spam Works--and How to Fight It | p. 126 |
Chapter 14 How Denial-of-Service Attacks Bring Down Websites | p. 142 |
Chapter 15 How Virtual Private Networks and Encryption Keep You Safe | p. 150 |
Chapter 16 How Web Blocking and Parental Controls Work | p. 160 |
Chapter 17 How Personal Firewalls and Proxy Servers Protect Your | p. 166 |
Part 2 Personal Privacy and Security | p. 178 |
Chapter 18 How Identity Theft Works | p. 182 |
Chapter 19 Credit Card Security | p. 190 |
Chapter 20 The Dangers of Data Mining | p. 198 |
Chapter 21 The Dangers of Workplace Surveillance | p. 204 |
Chapter 22 How Cell Phones Can Be Hacked | p. 210 |
Chapter 23 How Biometrics Works | p. 218 |
Chapter 24 How Radio Frequency ID Can Invade Your Pirvacy | p. 224 |
Chapter 25 How Location Tracking Works | p. 230 |
Chapter 26 How DNA Matching Works | p. 236 |
Chapter 27 How Airport Scanners and Screening Systems Work | p. 242 |
Chapter 28 The Federal Government, Privacy, and Electronic Surveillance | p. 248 |
Chapter 29 How Wiretapping and Lie Detectors Work | p. 256 |
Index | p. 264 |