How Personal & Internet Security Work

Paperback
from $0.00

Author: Preston Gralla

ISBN-10: 0789735539

ISBN-13: 9780789735539

Category: Internet Law

In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft and consumer fraud in 2004. Don't allow yourself to become a part of the statistics!\ How Personal and Internet Security Works illustrates in vivid detail the many dangers...

Search in google:

In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft and consumer fraud in 2004. Don't allow yourself to become a part of the statistics!How Personal and Internet Security Works illustrates in vivid detail the many dangers faced by those who use the Internet to send or receive email, surf the Web, conduct personal business, use a credit card, or even travel to airports and how those dangers can be solved. You'll also get detailed explanations of Internet privacy issues such as spyware, phishing, identity theft, data mining, biometrics, and security cameras, as well as Homeland Security issues such as airport scanning and terrorist screening.

Pt. 1Internet security2Ch. 1How the Internet works8Ch. 2How hackers break in to your PC - and how to protect against them14Ch. 3How spyware and anti-spyware work22Ch. 4How Websites invade your privacy42Ch. 5The dangers of Internet search52Ch. 6How "phishing" attacks can steal your identity - and how to protect against them58Ch. 7How zombies and Trojan horses attack you - and how to protect against them66Ch. 8The security dangers in browsers76Ch. 9How worms and viruses do their damage - and how to protect against them82Ch. 10Wi-Fi security dangers and protections90Ch. 11Bluetooth security dangers110Ch. 12How instant messaging pests work116Ch. 13How spare works - and how to fight it126Ch. 14How denial-of-service attacks bring down Websites142Ch. 15How virtual private networks and encryption keep you safe150Ch. 16How Web blocking and parental controls work160Ch. 17How personal firewalls and proxy servers protect you166Pt. 2Personal privacy and security178Ch. 18How identity theft works182Ch. 19Credit card security190Ch. 20The dangers of data mining198Ch. 21The dangers of workplace surveillance204Ch. 22How cell phones can be hacked210Ch. 23How biometrics works218Ch. 24How radio frequency ID can invade your privacy224Ch. 25How location tracking works230Ch. 26How DNA matching works236Ch. 27How airport scanners and screening systems work242Ch. 28The federal government, privacy, and electronic surveillance248Ch. 29How wiretapping and lie detectors work256