Flylib.com
How Personal & Internet Security Works
How Personal & Internet Security Works
ISBN: 0789735539
EAN: 2147483647
Year: 2004
Pages: 161
Authors:
Preston Gralla
BUY ON AMAZON
How Personal Internet Security Work
Table of Contents
Copyright
About the Author
Acknowledgments
We Want to Hear from You
Reader Services
Introduction
Part 1: Internet Security
Chapter 1. How the Internet Works
How TCPIP Works
How the World Wide Web Works
Chapter 2. How Hackers Break In to Your PCand How to Protect Against Them
How Hackers Invade PCs
How Script Kiddies Target PCs
How Personal Hacker Protection Works
Chapter 3. How Spyware and Anti-Spyware Work
How Spyware Invades Your PC
How Spyware Morphs Itself to Escape Detection
How Spyware Invades Your Privacy
How Home Page and Search Page Hijackers Work
How Dialers Work
How Keyloggers Work
How Rootkits Work
Following the Spyware Money Trail
How Anti-Spyware Works
Chapter 4. How Websites Invade Your Privacy
How Cookies Work
How Web Bugs Track You
How Websites Track Your Activities
How Websites Build Personal Profiles of You
Chapter 5. The Dangers of Internet Search
How Google Searches the Internet
What Google Knows About You
Chapter 6. How Phishing Attacks Can Steal Your Identityand How to Protect Against Them
How Phishing Works
Following the Phishing Money Trail
How to Protect Against Phishing Attacks
Chapter 7. How Zombies and Trojan Horses Attack Youand How to Protect Against Them
How Zombies and Bot Networks Work
How Trojan Horses Work
Following the Zombie Money Trail
How Zombie and Trojan Protection Works
Chapter 8. The Security Dangers in Browsers
How Hackers Exploit Browsers
How to Protect Against Browser-based Attacks
Chapter 9. How Worms and Viruses Do Their Damageand How to Protect Against Them
How Viruses Work
How Worms Work
How Antivirus Software Works
Chapter 10. Wi-Fi Security Dangers and Protections
How Wi-Fi Works
How Hackers Invade Wi-Fi Networks
How Hotspots Work
How Hotspot Hacking Works
How Evil Twin Hacks Work
How War Drivers Invade Your Network
How Wireless Network Protection Works
How Hotspot Protection Works
How Wi-Fi Encryption Works
Chapter 11. Bluetooth Security Dangers
How Bluetooth Works
How Bluetooth Can Be Hacked
Chapter 12. How Instant Messaging Pests Work
How IRC Works
How Instant Messaging Works
How Instant Messaging Pests Attack You
How Instant Messaging Pest Protection Works
Chapter 13. How Spam Worksand How to Fight It
How Spam Works
The Dangers of Spam
How Nigerian 419 Scams Work
How Spammers Hide Their Identity
How Spammers Find You
How Anti-Spam Software Works
How Anti-Spam Software Sniffs Out Phony Email
Chapter 14. How Denial-of-Service Attacks Bring Down Websites
How Denial-of-Service Attacks Target Websites
How Hackers Invade Websites
How to Protect Against Denial-of-Service Attacks
Chapter 15. How Virtual Private Networks and Encryption Keep You Safe
How Virtual Private Networks Work
How Cryptosystems Work
How Digital Certificates Ensure Internet Security
How Internet Passports Work
Chapter 16. How Web Blocking and Parental Controls Work
How Web Blocking Works
How Parental Controls Work
Chapter 17. How Personal Firewalls and Proxy Servers Protect You
How Personal Firewalls Protect PCs
How Network Address Translation Protects Home Networks
How Proxy Servers Work
How Corporate Firewalls Protect the Workplace
How Intrusion Protection Systems Work
Part 2: Personal Privacy and Security
Chapter 18. How Identity Theft Works
How Thieves Can Steal Your Identity
How Thieves Make Use of Stolen Identities
How You Can Protect Against Identity Theft
Chapter 19. Credit Card Security
How Credit Card Information Is Stolen
How Financial Firms Detect Credit Card Fraud
Following the Black Market Credit Card Money Trail
Chapter 20. The Dangers of Data Mining
How Data Mining Works
The Dangers of Data Mining
Chapter 21. The Dangers of Workplace Surveillance
How Workplace Surveillance Works
How Employers Track Employee Internet Use
Chapter 22. How Cell Phones Can Be Hacked
A Look at Cell Phone Hacking Dangers
How Bluesnarfing Works
How Paris Hilton s Cell Phone Was Hacked
Chapter 23. How Biometrics Works
How Iris Scanning Works
How Fingerprinting ID Works
Chapter 24. How Radio Frequency ID Can Invade Your Privacy
How RFID Works
How RFID Can Track Your Life
Chapter 25. How Location Tracking Works
How Global Positioning Satellites Work
How Cell Phone Location Tracking Works
Chapter 26. How DNA Matching Works
How DNA Matching Works
The Dangers of DNA Profiling
Chapter 27. How Airport Scanners and Screening Systems Work
How Airport Scanners Work
How Airport Terrorist Tracking Systems Work
Chapter 28. The Federal Government, Privacy, and Electronic Surveillance
How the NSA s Echelon Spy System Works
How the FBI s Carnivore System Worked
How the Patriot Act Can Invade Your Privacy
Chapter 29. How Wiretapping and Lie Detectors Work
How Wiretapping Works
How Legal Wiretapping Works
How Lie Detectors Work
Index
A
B
C
D
E
F
G
H
I
K
L
M
N
O
P
R
S
T
U
V
W
X
Z
How Personal & Internet Security Works
ISBN: 0789735539
EAN: 2147483647
Year: 2004
Pages: 161
Authors:
Preston Gralla
BUY ON AMAZON
VBScript Programmers Reference
Data Types
Variables and Procedures
Regular Expressions
Appendix F The Scripting Runtime Library Object Reference
Appendix L ActiveX Data Objects
C++ How to Program (5th Edition)
Algorithms
Introduction to C++ Standard Library Class Template vector
Composition: Objects as Members of Classes
Case Study: A Date Class
G.9. Class Transaction
Junos Cookbook (Cookbooks (OReilly))
Authenticating NTP
Viewing the Routes in the Routing Table
Viewing Routes Learned from a Specific Protocol
Prepending AS Numbers to the AS Path
Limiting the Group Ranges an RP Services
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
Getting Faster to Get Better Why You Need Both Lean and Six Sigma
Seeing Services Through Your Customers Eyes-Becoming a customer-centered organization
Success Story #2 Bank One Bigger… Now Better
Success Story #4 Stanford Hospital and Clinics At the forefront of the quality revolution
First Wave Service Projects
Programming .Net Windows Applications
List Controls
Date and Time Controls
Updating Data with Transactions
Bugs Versus Exceptions
Configuration and Deployment
Python Standard Library (Nutshell Handbooks) with
The zlib Module
Overview
The fcntl Module
The curses Module
The new Module
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies