Chapter 1Viruses: Attack of the Malicious Programs Chapter 2Spyware: Overrun by Advertisers, Hijackers, and Opportunists Chapter 3Hackers: There's a Man in My Machine Chapter 4Identity Thieves and Phishers: Protect Your Good Name and Bank Account Chapter 5Spam: Unwanted Email from Hell Chapter 6Wireless Network Snoops: Lock Down Your Wi-Fi Network Chapter 7Privacy Snoops: Cover Your Tracks and Your Reputation Chapter 8Let's Smash-Proof Windows: Tweak Windows XP Nice and Tight Chapter 9Starting from the Beginning: Wiping a Hard Drive and Rebuilding from the Ground Up Chapter 10Ongoing Maintenance: Fend Off Future Threats! Chapter 11Selecting Software: Steals, Deals, and Software Duds Chapter 12Tools of the Trade: Security Products You Should Own Glossary |