Table of Contents

book cover
How Personal & Internet Security Work
By Preston Gralla
Publisher: Que
Pub Date: May 31, 2006
Print ISBN-10: 0-7897-3553-9
Print ISBN-13: 978-0-7897-3553-9
Pages: 288

Table of Contents  | Index

       About the Author
       We Want to Hear from You!
       Reader Services
    Part 1:  Internet Security
          Chapter 1.  How the Internet Works
      How TCP/IP Works
      How the World Wide Web Works
          Chapter 2.  How Hackers Break In to Your PCand How to Protect Against Them
      How Hackers Invade PCs
      How Script Kiddies Target PCs
      How Personal Hacker Protection Works
          Chapter 3.  How Spyware and Anti-Spyware Work
      How Spyware Invades Your PC
      How Spyware Morphs Itself to Escape Detection
      How Spyware Invades Your Privacy
      How Home Page and Search Page Hijackers Work
      How Dialers Work
      How Keyloggers Work
      How Rootkits Work
      Following the Spyware Money Trail
      How Anti-Spyware Works
          Chapter 4.  How Websites Invade Your Privacy
      How Cookies Work
      How Web Bugs Track You
      How Websites Track Your Activities
      How Websites Build Personal Profiles of You
          Chapter 5.  The Dangers of Internet Search
      How Google Searches the Internet
      What Google Knows About You
          Chapter 6.  How "Phishing" Attacks Can Steal Your Identityand How to Protect Against Them
      How Phishing Works
      Following the Phishing Money Trail
      How to Protect Against Phishing Attacks
          Chapter 7.  How Zombies and Trojan Horses Attack Youand How to Protect Against Them
      How Zombies and Bot Networks Work
      How Trojan Horses Work
      Following the Zombie Money Trail
      How Zombie and Trojan Protection Works
          Chapter 8.  The Security Dangers in Browsers
      How Hackers Exploit Browsers
      How to Protect Against Browser-based Attacks
          Chapter 9.  How Worms and Viruses Do Their Damageand How to Protect Against Them
      How Viruses Work
      How Worms Work
      How Antivirus Software Works
          Chapter 10.  Wi-Fi Security Dangers and Protections
      How Wi-Fi Works
      How Hackers Invade Wi-Fi Networks
      How Hotspots Work
      How Hotspot Hacking Works
      How "Evil Twin" Hacks Work
      How War Drivers Invade Your Network
      How Wireless Network Protection Works
      How Hotspot Protection Works
      How Wi-Fi Encryption Works
          Chapter 11.  Bluetooth Security Dangers
      How Bluetooth Works
      How Bluetooth Can Be Hacked
          Chapter 12.  How Instant Messaging Pests Work
      How IRC Works
      How Instant Messaging Works
      How Instant Messaging Pests Attack You
      How Instant Messaging Pest Protection Works
          Chapter 13.  How Spam Worksand How to Fight It
      How Spam Works
      The Dangers of Spam
      How Nigerian 419 Scams Work
      How Spammers Hide Their Identity
      How Spammers Find You
      How Anti-Spam Software Works
      How Anti-Spam Software Sniffs Out Phony Email
          Chapter 14.  How Denial-of-Service Attacks Bring Down Websites
      How Denial-of-Service Attacks Target Websites
      How Hackers Invade Websites
      How to Protect Against Denial-of-Service Attacks
          Chapter 15.  How Virtual Private Networks and Encryption Keep You Safe
      How Virtual Private Networks Work
      How Cryptosystems Work
      How Digital Certificates Ensure Internet Security
      How Internet Passports Work
          Chapter 16.  How Web Blocking and Parental Controls Work
      How Web Blocking Works
      How Parental Controls Work
          Chapter 17.  How Personal Firewalls and Proxy Servers Protect You
      How Personal Firewalls Protect PCs
      How Network Address Translation Protects Home Networks
      How Proxy Servers Work
      How Corporate Firewalls Protect the Workplace
      How Intrusion Protection Systems Work
    Part 2:  Personal Privacy and Security
          Chapter 18.  How Identity Theft Works
      How Thieves Can Steal Your Identity
      How Thieves Make Use of Stolen Identities
      How You Can Protect Against Identity Theft
          Chapter 19.  Credit Card Security
      How Credit Card Information Is Stolen
      How Financial Firms Detect Credit Card Fraud
      Following the Black Market Credit Card Money Trail
          Chapter 20.  The Dangers of Data Mining
      How Data Mining Works
      The Dangers of Data Mining
          Chapter 21.  The Dangers of Workplace Surveillance
      How Workplace Surveillance Works
      How Employers Track Employee Internet Use
          Chapter 22.  How Cell Phones Can Be Hacked
      A Look at Cell Phone Hacking Dangers
      How Bluesnarfing Works
      How Paris Hilton's Cell Phone Was Hacked
          Chapter 23.  How Biometrics Works
      How Iris Scanning Works
      How Fingerprinting ID Works
          Chapter 24.  How Radio Frequency ID Can Invade Your Privacy
      How RFID Works
      How RFID Can Track Your Life
          Chapter 25.  How Location Tracking Works
      How Global Positioning Satellites Work
      How Cell Phone Location Tracking Works
          Chapter 26.  How DNA Matching Works
      How DNA Matching Works
      The Dangers of DNA Profiling
          Chapter 27.  How Airport Scanners and Screening Systems Work
      How Airport Scanners Work
      How Airport Terrorist Tracking Systems Work
          Chapter 28.  The Federal Government, Privacy, and Electronic Surveillance
      How the NSA's Echelon Spy System Works
      How the FBI's Carnivore System Worked
      How the Patriot Act Can Invade Your Privacy
          Chapter 29.  How Wiretapping and Lie Detectors Work
      How Wiretapping Works
      How Legal Wiretapping Works
      How Lie Detectors Work

How Personal & Internet Security Work
How Personal & Internet Security Works
ISBN: 0789735539
EAN: 2147483647
Year: 2004
Pages: 161

Similar book on Amazon © 2008-2017.
If you may any questions please contact us: