How Personal & Internet Security Works

How Personal & Internet Security Works

3.66 (6 ratings by Goodreads)
By (author) 

List price: US$29.98

Currently unavailable

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks

Description

In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft and consumer fraud in 2004. Don't allow yourself to become a part of the statistics! How Personal and Internet Security Works illustrates in vivid detail the many dangers faced by those who use the Internet to send or receive email, surf the Web, conduct personal business, use a credit card, or even travel to airports and how those dangers can be solved. You'll also get detailed explanations of Internet privacy issues such as spyware, phishing, identity theft, data mining, biometrics, and security cameras, as well as Homeland Security issues such as airport scanning and terrorist screening.
show more

Product details

  • Paperback | 288 pages
  • 203.2 x 251.5 x 17.8mm | 657.72g
  • Que Corporation,U.S.
  • United States
  • English
  • col. Illustrations
  • 0789735539
  • 9780789735539
  • 1,202,071

Back cover copy

In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft and consumer fraud in 2004. Don't allow yourself to become a part of the statistics! "How Personal and Internet Security Works "illustrates in vivid detail the many dangers faced by those who use the Internet to send or receive email, surf the Web, conduct personal business, use a credit card, or even travel to airports and how those dangers can be solved. You'll also get detailed explanations of Internet privacy issues such as spyware, phishing, identity theft, data mining, biometrics, and security cameras, as well as Homeland Security issues such as airport scanning and terrorist screening.
show more

Table of contents

Introduction viii Part I Internet Security 2Chapter 1 How the Internet Works 8Chapter 2 How Hackers Break Into Your PC--and How to Protect Against Them 14Chapter 3 How Spyware and Anti-Apyware Work 22Chapter 4 How Websites Invade Your Privacy 42Chapter 5 The Dangers of Internet Search 52Chapter 6 How "Phishing" Attacks Can Steal Your Identity--and How to Protect Against Them 58Chapter 7 How Zombies and Trojan Horses Attack You--and How to Protect Against Them 66Chapter 8 The Security Dangers in Browsers 76Chapter 9 How Worms and Viruses Do Their Damage--and How to Protect Against Them 82Chapter 10 Wi-Fi Security Dangers and Protectionis 90Chapter 11 Bluetooth Security Dangers 110Chapter 12 How Instant Messages Pests Work 116Chapter 13 How Spam Works--and How to Fight It 126Chapter 14 How Denial-of-Service Attacks Bring Down Websites 142Chapter 15 How Virtual Private Networks and Encryption Keep You Safe 150Chapter 16 How Web Blocking and Parental Controls Work 160Chapter 17 How Personal Firewalls and Proxy Servers Protect Your 166 Part 2 Personal Privacy and Security 178Chapter 18 How Identity Theft Works 182Chapter 19 Credit Card Security 190Chapter 20 The Dangers of Data Mining 198Chapter 21 The Dangers of Workplace Surveillance 204Chapter 22 How Cell Phones Can Be Hacked 210Chapter 23 How Biometrics Works 218Chapter 24 How Radio Frequency ID Can Invade Your Pirvacy 224Chapter 25 How Location Tracking Works 230Chapter 26 How DNA Matching Works 236Chapter 27 How Airport Scanners and Screening Systems Work 242Chapter 28 The Federal Government, Privacy, and Electronic Surveillance 248Chapter 29 How Wiretapping and Lie Detectors Work 256 Index 264
show more

About Preston Gralla

Preston Gralla is the award-winning author of more than 30 books, including How the Internet Works, Complete Idiot's Guide to Internet Privacy and Security, Complete Idiot's Guide to Protecting Your Child Online, and How Wireless Works. He has written frequently about security issues, computer technology, the Internet, and has been a columnist for many magazines, Web sites and newspapers, including USA Today, PC Magazine, Los Angeles Times, Dallas Morning News, Boston Magazine, PC/Computing, CNet/ZDNet, and FamilyPC.
show more

Rating details

6 ratings
3.66 out of 5 stars
5 33% (2)
4 17% (1)
3 33% (2)
2 17% (1)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X