How personal & Internet security works /
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
[Indianapolis, Ind.] :
Que Pub.,
2006.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- How the Internet works
- How hackers break into your PC and how to protect against them
- How spyware and anti-spyware work
- How websites invade your privacy
- The dangers of Internet search
- How "phishing" attacks can steal your identity and how to protect against them
- How Zombies and Trojan Horses attack you and how to protect against them
- The security dangers in Browsers
- How Worms and Viruses do their damage and how to protect against them
- Wi-Fi security dangers and protections
- Bluetooth security dangers
- How Instant Messaging pests work
- How Spam works and how to fight it
- How Denial-of-Service attacks bring down websites
- How virtual private networks and encryption keep you safe
- How Web blocking and parental controls work
- How personal Firewalls and Proxy Servers protect you
- How Identity Theft works
- Credit card security
- The Dangers of Data Mining
- The Dangers of workplace surveillance
- How cell phones can be hacked
- How Biometrics works
- How Radio Frequency ID can invade your privacy
- How location tracking works
- How DNA matching works
- How airport scanners and screening systems work
- The Federal government, privacy, and electronic surveillance
- How wiretapping and lie detectors work.