How Personal & Internet Security Works
Que Corporation,U.S. (Verlag)
978-0-7897-3553-9 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft and consumer fraud in 2004. Don't allow yourself to become a part of the statistics!
How Personal and Internet Security Works illustrates in vivid detail the many dangers faced by those who use the Internet to send or receive email, surf the Web, conduct personal business, use a credit card, or even travel to airports and how those dangers can be solved. You'll also get detailed explanations of Internet privacy issues such as spyware, phishing, identity theft, data mining, biometrics, and security cameras, as well as Homeland Security issues such as airport scanning and terrorist screening.
Preston Gralla is the award-winning author of more than 30 books, including How the Internet Works, Complete Idiot's Guide to Internet Privacy and Security, Complete Idiot's Guide to Protecting Your Child Online, and How Wireless Works. He has written frequently about security issues, computer technology, the Internet, and has been a columnist for many magazines, Web sites and newspapers, including USA Today, PC Magazine, Los Angeles Times, Dallas Morning News, Boston Magazine, PC/Computing, CNet/ZDNet, and FamilyPC.
Introduction viii
Part I Internet Security 2
Chapter 1 How the Internet Works 8
Chapter 2 How Hackers Break Into Your PC--and How to Protect Against Them 14
Chapter 3 How Spyware and Anti-Apyware Work 22
Chapter 4 How Websites Invade Your Privacy 42
Chapter 5 The Dangers of Internet Search 52
Chapter 6 How "Phishing" Attacks Can Steal Your Identity--and How to Protect Against Them 58
Chapter 7 How Zombies and Trojan Horses Attack You--and How to Protect Against Them 66
Chapter 8 The Security Dangers in Browsers 76
Chapter 9 How Worms and Viruses Do Their Damage--and How to Protect Against Them 82
Chapter 10 Wi-Fi Security Dangers and Protectionis 90
Chapter 11 Bluetooth Security Dangers 110
Chapter 12 How Instant Messages Pests Work 116
Chapter 13 How Spam Works--and How to Fight It 126
Chapter 14 How Denial-of-Service Attacks Bring Down Websites 142
Chapter 15 How Virtual Private Networks and Encryption Keep You Safe 150
Chapter 16 How Web Blocking and Parental Controls Work 160
Chapter 17 How Personal Firewalls and Proxy Servers Protect Your 166
Part 2 Personal Privacy and Security 178
Chapter 18 How Identity Theft Works 182
Chapter 19 Credit Card Security 190
Chapter 20 The Dangers of Data Mining 198
Chapter 21 The Dangers of Workplace Surveillance 204
Chapter 22 How Cell Phones Can Be Hacked 210
Chapter 23 How Biometrics Works 218
Chapter 24 How Radio Frequency ID Can Invade Your Pirvacy 224
Chapter 25 How Location Tracking Works 230
Chapter 26 How DNA Matching Works 236
Chapter 27 How Airport Scanners and Screening Systems Work 242
Chapter 28 The Federal Government, Privacy, and Electronic Surveillance 248
Chapter 29 How Wiretapping and Lie Detectors Work 256
Index 264
Erscheint lt. Verlag | 8.6.2006 |
---|---|
Sprache | englisch |
Maße | 254 x 204 mm |
Gewicht | 572 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-7897-3553-9 / 0789735539 |
ISBN-13 | 978-0-7897-3553-9 / 9780789735539 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich