Cart
Free US shipping over $10
Proud to be B-Corp

How Personal & Internet Security Works Preston Gralla

How Personal & Internet Security Works By Preston Gralla

How Personal & Internet Security Works by Preston Gralla


$10.00
Condition - Good
Only 1 left

Summary

Illustrates the many dangers faced by those who use the Internet to send or receive email, surf the Web, conduct personal business, use a credit card, or even travel to airports and how those dangers can be solved. This title offers explanations of Internet privacy issues such as spyware, phishing, identity theft, data mining, and more.

How Personal & Internet Security Works Summary

How Personal & Internet Security Works by Preston Gralla

In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft and consumer fraud in 2004. Don't allow yourself to become a part of the statistics!

How Personal and Internet Security Works illustrates in vivid detail the many dangers faced by those who use the Internet to send or receive email, surf the Web, conduct personal business, use a credit card, or even travel to airports and how those dangers can be solved. You'll also get detailed explanations of Internet privacy issues such as spyware, phishing, identity theft, data mining, biometrics, and security cameras, as well as Homeland Security issues such as airport scanning and terrorist screening.

About Preston Gralla

Preston Gralla is the award-winning author of more than 30 books, including How the Internet Works, Complete Idiot's Guide to Internet Privacy and Security, Complete Idiot's Guide to Protecting Your Child Online, and How Wireless Works. He has written frequently about security issues, computer technology, the Internet, and has been a columnist for many magazines, Web sites and newspapers, including USA Today, PC Magazine, Los Angeles Times, Dallas Morning News, Boston Magazine, PC/Computing, CNet/ZDNet, and FamilyPC.

Table of Contents

Introduction viii

Part I Internet Security 2

Chapter 1 How the Internet Works 8

Chapter 2 How Hackers Break Into Your PC--and How to Protect Against Them 14

Chapter 3 How Spyware and Anti-Apyware Work 22

Chapter 4 How Websites Invade Your Privacy 42

Chapter 5 The Dangers of Internet Search 52

Chapter 6 How "Phishing" Attacks Can Steal Your Identity--and How to Protect Against Them 58

Chapter 7 How Zombies and Trojan Horses Attack You--and How to Protect Against Them 66

Chapter 8 The Security Dangers in Browsers 76

Chapter 9 How Worms and Viruses Do Their Damage--and How to Protect Against Them 82

Chapter 10 Wi-Fi Security Dangers and Protectionis 90

Chapter 11 Bluetooth Security Dangers 110

Chapter 12 How Instant Messages Pests Work 116

Chapter 13 How Spam Works--and How to Fight It 126

Chapter 14 How Denial-of-Service Attacks Bring Down Websites 142

Chapter 15 How Virtual Private Networks and Encryption Keep You Safe 150

Chapter 16 How Web Blocking and Parental Controls Work 160

Chapter 17 How Personal Firewalls and Proxy Servers Protect Your 166

Part 2 Personal Privacy and Security 178

Chapter 18 How Identity Theft Works 182

Chapter 19 Credit Card Security 190

Chapter 20 The Dangers of Data Mining 198

Chapter 21 The Dangers of Workplace Surveillance 204

Chapter 22 How Cell Phones Can Be Hacked 210

Chapter 23 How Biometrics Works 218

Chapter 24 How Radio Frequency ID Can Invade Your Pirvacy 224

Chapter 25 How Location Tracking Works 230

Chapter 26 How DNA Matching Works 236

Chapter 27 How Airport Scanners and Screening Systems Work 242

Chapter 28 The Federal Government, Privacy, and Electronic Surveillance 248

Chapter 29 How Wiretapping and Lie Detectors Work 256

Index 264

Additional information

GOR004828355
9780789735539
0789735539
How Personal & Internet Security Works by Preston Gralla
Used - Good
Paperback
Pearson Education (US)
2006-06-08
288
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in good condition, but if you are not entirely satisfied please get in touch with us

Customer Reviews - How Personal & Internet Security Works