Flylib.com
Computer Privacy Annoyances
Computer Privacy Annoyances
ISBN: 596007752
EAN: N/A
Year: 2005
Pages: 89
BUY ON AMAZON
Computer Privacy Annoyances
Table of Contents
Copyright
Introduction
Privacy Is Personal
Who Should Read This Book?
How This Book Is Organized
Tips...and a Whole Lot More
Accuracy and Timeliness
Conventions Used in This Book
O Reilly Would Like to Hear From You
About the Author
Acknowledgments
Chapter 1. PRIVACY AT RISK
The Spy on Your Desk
Dawn of the Undead PC
Working for the Man
The Information Explosion
The Data Industrial Complex
Location, Location, Location
Chapter 2. PRIVACY AT HOME
MY DATA, MYSELF
HOME SWEET NETWORKS
CELL PHONES
TELEMARKETING, JUNK MAIL, AND FAXES
IDENTITY THEFT
Chapter 3. PRIVACY ON THE NET
BROWSING AROUND
EMAIL
HACKERS, VIRUSES, AND WORMS-OH MY
ONLINE SHOPPING
ONLINE FILE SWAPPING
KIDS AND THE NET
PRIVACY LARGE
Chapter 4. PRIVACY AT WORK
THE INTERNET AT WORK
APPLYING FOR WORK
HRPERSONNEL RECORDS
MISCELLANEOUS WORK ISSUES
Chapter 5. PRIVACY IN PUBLIC
AT THE STORE
LIBRARIES AND SCHOOLS
ON THE ROAD
AT THE DOCTOR S OFFICE
AT THE BANK
MISCELLANEOUS
Chapter 6. PRIVACY AND UNCLE SAM
PUBLIC AGENCIES AND YOU
POLITICAL PRIVACY
LOCAL LAW ENFORCEMENT
SPOOKS AND SNOOPS
Chapter 7. Privacy in the Future
SLAMMING SPAM
ASSURING AUTHENTICATION
REGARDING REPUTATION
FOILING PHISHERS
RATING RISKS
INSULATING IDENTITY
WHITHER WASHINGTON?
PRIVACY POWER
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_Y
index_Z
Computer Privacy Annoyances
ISBN: 596007752
EAN: N/A
Year: 2005
Pages: 89
BUY ON AMAZON
Absolute Beginner[ap]s Guide to Project Management
Project Plan Checklist
The Goal of the Schedule Development Process
Common Budget Challenges
Options for Issue Log
The Essential Process for Managing Project Risks
The CISSP and CAP Prep Guide: Platinum Edition
Access Control
Telecommunications and Network Security
Initiation of the System Authorization Process
The Accreditation Phase
Appendix A Answers to Assessment Questions
Oracle Developer Forms Techniques
Creating a Customized Sign-on Form
Object and Code Reusability
Summary
When to Use the Same Trigger and How to Make It Fire at Multiple Levels
Creating a Tree Item
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Deployment Scenarios
Advanced Features
Monitoring and Troubleshooting Site-to-Site IPSec VPNs
Address Translation
Summary
What is Lean Six Sigma
Key #1: Delight Your Customers with Speed and Quality
Key #2: Improve Your Processes
Key #3: Work Together for Maximum Gain
The Experience of Making Improvements: What Its Like to Work on Lean Six Sigma Projects
Six Things Managers Must Do: How to Support Lean Six Sigma
Comparing, Designing, and Deploying VPNs
Deploying Site-to-Site and Remote Access VPNs: A Comparison
Benefits and Drawbacks of AToM-Based L2VPNs
MTU and Fragmentation Considerations in an IPsec VPN
Understanding VPLS
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies