Book description
In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft and consumer fraud in 2004. Don't allow yourself to become a part of the statistics!
How Personal and Internet Security Works illustrates in vivid detail the many dangers faced by those who use the Internet to send or receive email, surf the Web, conduct personal business, use a credit card, or even travel to airports and how those dangers can be solved. You'll also get detailed explanations of Internet privacy issues such as spyware, phishing, identity theft, data mining, biometrics, and security cameras, as well as Homeland Security issues such as airport scanning and terrorist screening.
Table of contents
- Copyright
- About the Author
- Acknowledgments
- We Want to Hear from You!
- Reader Services
- Introduction
-
1. Internet Security
- 1. How the Internet Works
- 2. How Hackers Break In to Your PC—and How to Protect Against Them
- 3. How Spyware and Anti-Spyware Work
- 4. How Websites Invade Your Privacy
- 5. The Dangers of Internet Search
- 6. How “Phishing” Attacks Can Steal Your Identity—and How to Protect Against Them
- 7. How Zombies and Trojan Horses Attack You—and How to Protect Against Them
- 8. The Security Dangers in Browsers
- 9. How Worms and Viruses Do Their Damage—and How to Protect Against Them
- 10. Wi-Fi Security Dangers and Protections
- 11. Bluetooth Security Dangers
- 12. How Instant Messaging Pests Work
- 13. How Spam Works—and How to Fight It
- 14. How Denial-of-Service Attacks Bring Down Websites
- 15. How Virtual Private Networks and Encryption Keep You Safe
- 16. How Web Blocking and Parental Controls Work
- 17. How Personal Firewalls and Proxy Servers Protect You
-
2. Personal Privacy and Security
- 18. How Identity Theft Works
- 19. Credit Card Security
- 20. The Dangers of Data Mining
- 21. The Dangers of Workplace Surveillance
- 22. How Cell Phones Can Be Hacked
- 23. How Biometrics Works
- 24. How Radio Frequency ID Can Invade Your Privacy
- 25. How Location Tracking Works
- 26. How DNA Matching Works
- 27. How Airport Scanners and Screening Systems Work
- 28. The Federal Government, Privacy, and Electronic Surveillance
- 29. How Wiretapping and Lie Detectors Work
Product information
- Title: How Personal & Internet Security Work
- Author(s):
- Release date: May 2006
- Publisher(s): Que
- ISBN: 9780789735539
You might also like
book
Absolute Beginner’s Guide To: Security, Spam, Spyware & Viruses
Batten down the hatches! Hackers, spammers and thieves (oh my!) are after you! The mere act …
book
Internet Fraud Casebook
Real case studies on Internet fraud written by real fraud examiners Internet Fraud Casebook: The World …
book
Combating Spyware in the Enterprise
Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly …
book
Sams Teach Yourself Networking in 24 Hours, Fourth Edition
In just 24 sessions of one hour or less, learn how to use today’s key networking …