Own Your Space
Addison-Wesley Educational Publishers Inc (Verlag)
978-0-321-42642-0 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
The book for teens that every parent should read!
You have been immersed in the technology since preschool. You download music, Google your homework, and constantly IM your friends. You check your email before dinner, tweak your MySpace page, and bypass that hardcopy diary for your own 31337 space in the blogosphere. While you’re doing that, you also need to protect yourself. This book is about keeping safe—protecting your data, your identity, and yourself without giving up all the great stuff the Net puts at your fingertips.
Learn how to
Kill viruses, worms, Trojans, and spyware
Give Spam the curb and smash web bugs
Understand just how public your “private” blogs are
Keep wireless freeloaders off your network
Safeguard your parents’ credit card and financial data
Understand what tools you need and how to tweak them
Linda McCarthy is a Security Architect in the office of the CTO at Symantec. Linda has been in the security field for over a decade, and has broken into systems around the world to show executives how easy it is to break into their networks. Linda has published seven books on computer security, and is the author of IT Security: Risking the Corporation. Linda also received the Woman of Influence Award in 2004 for computer security, a prestigious award given annually to only four women in the world.
A portion of the proceeds from this book have been designated by the author for nonprofit work to educate teens about Internet security.
Acknowledgments
About the Author
Preface
Chapter 1:
Know Your Villains
Chapter 2:
Drive-By Malicious Code
Chapter 3:
Data Grabbers and Dumpers
Chapter 4:
Spy vs. Spy
Chapter 5:
Giving Spam the Curb
Chapter 6:
Pretenders and Pirates
Chapter 7: Phishing for Dollars
Chapter 8: Taming the Cookie Monster
Chapter 9: Safe Cyber-Shopping
Chapter 10: Private Blogs and Public Places
Chapter 11: Any Port in a Storm
Chapter 12: Look Pa, No Strings!
Chapter 13: Protective Tools
Chapter 14: Tweaks
Appendix A: A Check List for Mom and Dad
Index
Linda McCarthy is an architect in the office of the CTO at Symantec. Linda started her security career breaking into computers on Sun Microsystems’ network over a decade ago. Linda has broken into systems around the world to show executives how easy it was to break into their networks. Linda was the vice president of Systems Engineering for Recourse technologies and is founder of Network Defense. Linda has published seven books on computer security, and is the author of IT Security Risking the Corporation. Linda also received the Woman of Influence Award for computer security, a prestigious award given annually to only four women in the world.
Acknowledgments
About the Author
Preface
Chapter 1:
Know Your Villains
Chapter 2: Drive-By Malicious Code
Chapter 3: Data Grabbers and Dumpers
Chapter 4: Spy vs. Spy
Chapter 5: Giving Spam the Curb
Chapter 6: Pretenders and Pirates
Chapter 7: Phishing for Dollars
Chapter 8: Taming the Cookie Monster
Chapter 9: Safe Cyber-Shopping
Chapter 10: Private Blogs and Public Places
Chapter 11: Any Port in a Storm
Chapter 12: Look Pa, No Strings!
Chapter 13: Protective Tools
Chapter 14: Tweaks
Appendix A: A Check List for Mom and Dad
Index
Erscheint lt. Verlag | 26.10.2006 |
---|---|
Verlagsort | New Jersey |
Sprache | englisch |
Maße | 231 x 181 mm |
Gewicht | 386 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Mathematik / Informatik ► Informatik ► Web / Internet | |
ISBN-10 | 0-321-42642-8 / 0321426428 |
ISBN-13 | 978-0-321-42642-0 / 9780321426420 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich