| | Copyright |
| | About the Author |
| | Acknowledgments |
| | We Want to Hear from You! |
| | Reader Services |
| | Introduction |
| | Part 1: Internet Security |
| | | Chapter 1. How the Internet Works |
| | | How TCP/IP Works |
| | | How the World Wide Web Works |
| | | Chapter 2. How Hackers Break In to Your PCand How to Protect Against Them |
| | | How Hackers Invade PCs |
| | | How Script Kiddies Target PCs |
| | | How Personal Hacker Protection Works |
| | | Chapter 3. How Spyware and Anti-Spyware Work |
| | | How Spyware Invades Your PC |
| | | How Spyware Morphs Itself to Escape Detection |
| | | How Spyware Invades Your Privacy |
| | | How Home Page and Search Page Hijackers Work |
| | | How Dialers Work |
| | | How Keyloggers Work |
| | | How Rootkits Work |
| | | Following the Spyware Money Trail |
| | | How Anti-Spyware Works |
| | | Chapter 4. How Websites Invade Your Privacy |
| | | How Cookies Work |
| | | How Web Bugs Track You |
| | | How Websites Track Your Activities |
| | | How Websites Build Personal Profiles of You |
| | | Chapter 5. The Dangers of Internet Search |
| | | How Google Searches the Internet |
| | | What Google Knows About You |
| | | Chapter 6. How "Phishing" Attacks Can Steal Your Identityand How to Protect Against Them |
| | | How Phishing Works |
| | | Following the Phishing Money Trail |
| | | How to Protect Against Phishing Attacks |
| | | Chapter 7. How Zombies and Trojan Horses Attack Youand How to Protect Against Them |
| | | How Zombies and Bot Networks Work |
| | | How Trojan Horses Work |
| | | Following the Zombie Money Trail |
| | | How Zombie and Trojan Protection Works |
| | | Chapter 8. The Security Dangers in Browsers |
| | | How Hackers Exploit Browsers |
| | | How to Protect Against Browser-based Attacks |
| | | Chapter 9. How Worms and Viruses Do Their Damageand How to Protect Against Them |
| | | How Viruses Work |
| | | How Worms Work |
| | | How Antivirus Software Works |
| | | Chapter 10. Wi-Fi Security Dangers and Protections |
| | | How Wi-Fi Works |
| | | How Hackers Invade Wi-Fi Networks |
| | | How Hotspots Work |
| | | How Hotspot Hacking Works |
| | | How "Evil Twin" Hacks Work |
| | | How War Drivers Invade Your Network |
| | | How Wireless Network Protection Works |
| | | How Hotspot Protection Works |
| | | How Wi-Fi Encryption Works |
| | | Chapter 11. Bluetooth Security Dangers |
| | | How Bluetooth Works |
| | | How Bluetooth Can Be Hacked |
| | | Chapter 12. How Instant Messaging Pests Work |
| | | How IRC Works |
| | | How Instant Messaging Works |
| | | How Instant Messaging Pests Attack You |
| | | How Instant Messaging Pest Protection Works |
| | | Chapter 13. How Spam Worksand How to Fight It |
| | | How Spam Works |
| | | The Dangers of Spam |
| | | How Nigerian 419 Scams Work |
| | | How Spammers Hide Their Identity |
| | | How Spammers Find You |
| | | How Anti-Spam Software Works |
| | | How Anti-Spam Software Sniffs Out Phony Email |
| | | Chapter 14. How Denial-of-Service Attacks Bring Down Websites |
| | | How Denial-of-Service Attacks Target Websites |
| | | How Hackers Invade Websites |
| | | How to Protect Against Denial-of-Service Attacks |
| | | Chapter 15. How Virtual Private Networks and Encryption Keep You Safe |
| | | How Virtual Private Networks Work |
| | | How Cryptosystems Work |
| | | How Digital Certificates Ensure Internet Security |
| | | How Internet Passports Work |
| | | Chapter 16. How Web Blocking and Parental Controls Work |
| | | How Web Blocking Works |
| | | How Parental Controls Work |
| | | Chapter 17. How Personal Firewalls and Proxy Servers Protect You |
| | | How Personal Firewalls Protect PCs |
| | | How Network Address Translation Protects Home Networks |
| | | How Proxy Servers Work |
| | | How Corporate Firewalls Protect the Workplace |
| | | How Intrusion Protection Systems Work |
| | Part 2: Personal Privacy and Security |
| | | Chapter 18. How Identity Theft Works |
| | | How Thieves Can Steal Your Identity |
| | | How Thieves Make Use of Stolen Identities |
| | | How You Can Protect Against Identity Theft |
| | | Chapter 19. Credit Card Security |
| | | How Credit Card Information Is Stolen |
| | | How Financial Firms Detect Credit Card Fraud |
| | | Following the Black Market Credit Card Money Trail |
| | | Chapter 20. The Dangers of Data Mining |
| | | How Data Mining Works |
| | | The Dangers of Data Mining |
| | | Chapter 21. The Dangers of Workplace Surveillance |
| | | How Workplace Surveillance Works |
| | | How Employers Track Employee Internet Use |
| | | Chapter 22. How Cell Phones Can Be Hacked |
| | | A Look at Cell Phone Hacking Dangers |
| | | How Bluesnarfing Works |
| | | How Paris Hilton's Cell Phone Was Hacked |
| | | Chapter 23. How Biometrics Works |
| | | How Iris Scanning Works |
| | | How Fingerprinting ID Works |
| | | Chapter 24. How Radio Frequency ID Can Invade Your Privacy |
| | | How RFID Works |
| | | How RFID Can Track Your Life |
| | | Chapter 25. How Location Tracking Works |
| | | How Global Positioning Satellites Work |
| | | How Cell Phone Location Tracking Works |
| | | Chapter 26. How DNA Matching Works |
| | | How DNA Matching Works |
| | | The Dangers of DNA Profiling |
| | | Chapter 27. How Airport Scanners and Screening Systems Work |
| | | How Airport Scanners Work |
| | | How Airport Terrorist Tracking Systems Work |
| | | Chapter 28. The Federal Government, Privacy, and Electronic Surveillance |
| | | How the NSA's Echelon Spy System Works |
| | | How the FBI's Carnivore System Worked |
| | | How the Patriot Act Can Invade Your Privacy |
| | | Chapter 29. How Wiretapping and Lie Detectors Work |
| | | How Wiretapping Works |
| | | How Legal Wiretapping Works |
| | | How Lie Detectors Work |
| | Index |