8.6 Conclusion

only for RuBoard - do not distribute or recompile

8.6 Conclusion

In this chapter, we explored a number of techniques and technologies that have been developed for tracking users on the Internet. In the next chapter, we will examine techniques that you can use for protecting your privacy. Then in Chapter 10, we'll look at technologies you can use for fighting back.

only for RuBoard - do not distribute or recompile


Web Security, Privacy & Commerce
Web Security, Privacy and Commerce, 2nd Edition
ISBN: 0596000456
EAN: 2147483647
Year: 2000
Pages: 194

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net