Book description
In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft and consumer fraud in 2004. Don't allow yourself to become a part of the statistics!
How Personal and Internet Security Works illustrates in vivid detail the many dangers faced by those who use the Internet to send or receive email, surf the Web, conduct personal business, use a credit card, or even travel to airports and how those dangers can be solved. You'll also get detailed explanations of Internet privacy issues such as spyware, phishing, identity theft, data mining, biometrics, and security cameras, as well as Homeland Security issues such as airport scanning and terrorist screening.
Table of contents
- Copyright
- About the Author
- Acknowledgments
- We Want to Hear from You!
- Reader Services
- Introduction
-
1. Internet Security
- 1. How the Internet Works
- 2. How Hackers Break In to Your PC—and How to Protect Against Them
- 3. How Spyware and Anti-Spyware Work
- 4. How Websites Invade Your Privacy
- 5. The Dangers of Internet Search
- 6. How “Phishing” Attacks Can Steal Your Identity—and How to Protect Against Them
- 7. How Zombies and Trojan Horses Attack You—and How to Protect Against Them
- 8. The Security Dangers in Browsers
- 9. How Worms and Viruses Do Their Damage—and How to Protect Against Them
- 10. Wi-Fi Security Dangers and Protections
- 11. Bluetooth Security Dangers
- 12. How Instant Messaging Pests Work
- 13. How Spam Works—and How to Fight It
- 14. How Denial-of-Service Attacks Bring Down Websites
- 15. How Virtual Private Networks and Encryption Keep You Safe
- 16. How Web Blocking and Parental Controls Work
- 17. How Personal Firewalls and Proxy Servers Protect You
-
2. Personal Privacy and Security
- 18. How Identity Theft Works
- 19. Credit Card Security
- 20. The Dangers of Data Mining
- 21. The Dangers of Workplace Surveillance
- 22. How Cell Phones Can Be Hacked
- 23. How Biometrics Works
- 24. How Radio Frequency ID Can Invade Your Privacy
- 25. How Location Tracking Works
- 26. How DNA Matching Works
- 27. How Airport Scanners and Screening Systems Work
- 28. The Federal Government, Privacy, and Electronic Surveillance
- 29. How Wiretapping and Lie Detectors Work
Product information
- Title: How Personal & Internet Security Work
- Author(s):
- Release date: May 2006
- Publisher(s): Que
- ISBN: 9780789735539
You might also like
book
Maximum Security, Third Edition
Maximum Security, Third Edition provides comprehensive, platform-by-platform coverage of security issues and includes clear, to the …
book
Absolute Beginner’s Guide To: Security, Spam, Spyware & Viruses
Batten down the hatches! Hackers, spammers and thieves (oh my!) are after you! The mere act …
book
Detecting and Combating Malicious Email
Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, …
book
Bring Your Own Device - The mobile computing challenge
The increasing use of personal devices such as smartphones and tablets in the workplace at work …