How Personal & Internet Security Works, Adobe Reader
In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft and consumer fraud in 2004. Don't allow yourself to become a part of the statistics!
How Personal and Internet Security Works illustrates in vivid detail the many dangers faced by those who use the Internet to send or receive email, surf the Web, conduct personal business, use a credit card, or even travel to airports and how those dangers can be solved. You'll also get detailed explanations of Internet privacy issues such as spyware, phishing, identity theft, data mining, biometrics, and security cameras, as well as Homeland Security issues such as airport scanning and terrorist screening.
Table of Contents
Part I Internet Security 2
Chapter 1 How the Internet Works 8
Chapter 2 How Hackers Break Into Your PC--and How to Protect Against Them 14
Chapter 3 How Spyware and Anti-Apyware Work 22
Chapter 4 How Websites Invade Your Privacy 42
Chapter 5 The Dangers of Internet Search 52
Chapter 6 How "Phishing" Attacks Can Steal Your Identity--and How to Protect Against Them 58
Chapter 7 How Zombies and Trojan Horses Attack You--and How to Protect Against Them 66
Chapter 8 The Security Dangers in Browsers 76
Chapter 9 How Worms and Viruses Do Their Damage--and How to Protect Against Them 82
Chapter 10 Wi-Fi Security Dangers and Protectionis 90
Chapter 11 Bluetooth Security Dangers 110
Chapter 12 How Instant Messages Pests Work 116
Chapter 13 How Spam Works--and How to Fight It 126
Chapter 14 How Denial-of-Service Attacks Bring Down Websites 142
Chapter 15 How Virtual Private Networks and Encryption Keep You Safe 150
Chapter 16 How Web Blocking and Parental Controls Work 160
Chapter 17 How Personal Firewalls and Proxy Servers Protect Your 166
Part 2 Personal Privacy and Security 178
Chapter 18 How Identity Theft Works 182
Chapter 19 Credit Card Security 190
Chapter 20 The Dangers of Data Mining 198
Chapter 21 The Dangers of Workplace Surveillance 204
Chapter 22 How Cell Phones Can Be Hacked 210
Chapter 23 How Biometrics Works 218
Chapter 24 How Radio Frequency ID Can Invade Your Pirvacy 224
Chapter 25 How Location Tracking Works 230
Chapter 26 How DNA Matching Works 236
Chapter 27 How Airport Scanners and Screening Systems Work 242
Chapter 28 The Federal Government, Privacy, and Electronic Surveillance 248
Chapter 29 How Wiretapping and Lie Detectors Work 256
eBook (Adobe DRM)
This eBook requires the free Adobe® Digital Editions software.
Before downloading this DRM-encrypted PDF, be sure to:
- Install the free Adobe Digital Editions software on your machine. Adobe Digital Editions only works on Macintosh and Windows, and requires the Adobe Flash Player. Please see the official system requirements.
- Authorize your copy of Adobe Digital Editions using your Adobe ID. If you don't already have an Adobe ID, you can create one here.
Also available in other formats.
Get access to thousands of books and training videos about technology, professional development and digital media from more than 40 leading publishers, including Addison-Wesley, Prentice Hall, Cisco Press, IBM Press, O'Reilly Media, Wrox, Apress, and many more. If you continue your subscription after your 30-day trial, you can receive 30% off a monthly subscription to the Safari Library for up to 12 months. That's a total savings of $199.