Welcome to STUDYtactics.com    
  BOOKS eCONTENT SPECIALTY STORES MY STUDYaides MY ACCOUNT  
New & Used Books
 
Product Detail
Product Information   |  Other Product Information

Product Information
How Personal and Internet Security Work
How Personal and Internet Security Work
Author: Gralla
Edition/Copyright: 2006
ISBN: 0-7897-3553-9
Publisher: Que
Type: Paperback
Other Product Information
Summary
Table of Contents
 
  Summary

How Personal and Internet Security Works is a stunning four-color illustrated title that shows in vivid detail the many dangers faced by those who use the Internet to send or receive email surf the Web conduct personal business use a credit card or even travel to airports and it also illustrates how those dangers can be solved. Lions Tiger and Bugs oh my! Here are just a few stats that can scare most consumers into learning more about the technology behind the unsafe threats to personal and Internet security including:- The U.S. Federal Trade Commission received 247000 consumer complaints in 2004 (up 15% from 2003) from individuals whose identity was stolen.- Reuters.com (2/2005) Americans lost548 million dollars to identity theft and consumer fraud in 2004.- Fraud and identity theft cost consumers at least437 million dollars in 2003These fascinating topics are demystified in a way that also provides guidance to those concerned about possible security breeches on their computer and in their lives.

 
  Table of Contents

Introductionviii
Part I Internet Security2

Chapter 1 How the Internet Works8
Chapter 2 How Hackers Break Into Your PC--and How to Protect Against Them14
Chapter 3 How Spyware and Anti-Apyware Work22
Chapter 4 How Websites Invade Your Privacy42
Chapter 5 The Dangers of Internet Search52
Chapter 6 How "Phishing" Attacks Can Steal Your Identity--and How to Protect Against Them58
Chapter 7 How Zombies and Trojan Horses Attack You--and How to Protect Against Them66
Chapter 8 The Security Dangers in Browsers76
Chapter 9 How Worms and Viruses Do Their Damage--and How to Protect Against Them82
Chapter 10 Wi-Fi Security Dangers and Protectionis90
Chapter 11 Bluetooth Security Dangers110
Chapter 12 How Instant Messages Pests Work116
Chapter 13 How Spam Works--and How to Fight It126
Chapter 14 How Denial-of-Service Attacks Bring Down Websites142
Chapter 15 How Virtual Private Networks and Encryption Keep You Safe150
Chapter 16 How Web Blocking and Parental Controls Work160
Chapter 17 How Personal Firewalls and Proxy Servers Protect Your166

Part 2 Personal Privacy and Security178

Chapter 18 How Identity Theft Works182
Chapter 19 Credit Card Security190
Chapter 20 The Dangers of Data Mining198
Chapter 21 The Dangers of Workplace Surveillance204
Chapter 22 How Cell Phones Can Be Hacked210
Chapter 23 How Biometrics Works218
Chapter 24 How Radio Frequency ID Can Invade Your Pirvacy224
Chapter 25 How Location Tracking Works230
Chapter 26 How DNA Matching Works236
Chapter 27 How Airport Scanners and Screening Systems Work242
Chapter 28 The Federal Government Privacy and Electronic Surveillance248
Chapter 29 How Wiretapping and Lie Detectors Work256

Index264

 

New & Used Books -  eContent -  Specialty Stores -  My STUDYaides -  My Account

Terms of Service & Privacy PolicyContact UsHelp © 1995-2024 STUDYtactics, All Rights Reserved