Résumé
In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft and consumer fraud in 2004. Don't allow yourself to become a part of the statistics!
How Personal and Internet Security Works illustrates in vivid detail the many dangers faced by those who use the Internet to send or receive email, surf the Web, conduct personal business, use a credit card, or even travel to airports and how those dangers can be solved. You'll also get detailed explanations of Internet privacy issues such as spyware, phishing, identity theft, data mining, biometrics, and security cameras, as well as Homeland Security issues such as airport scanning and terrorist screening.
L'auteur - Preston Gralla
Preston Gralla est l'auteur de plus de vingt livres sur l'Internet et l'informatique. Passionné du sujet, il a exercé sa plume dès les premiers PC, il a également été rédacteur de PC Computing et a écrit pour CNET/ZDNet, PC Magazine, Computerworld et le Los Angeles Times.
Preston Gralla is the editor of WindowsDevCenter.com and OnDotNet. He is the author of more than 30 books, including Internet Annoyances, PC Pest Control, and Windows XP Hacks, Second Edition, and co-author of Windows XP Cookbook. As an award-winning author and technology expert, Preston has written articles for major national newspapers and magazines and has also appeared on several TV and radio programs.
Sommaire
- Internet Security
- How the Internet Works
- How Hackers Break Into Your PC--and How to Protect Against Them
- How Spyware and Anti-Apyware Work
- How Websites Invade Your Privacy
- The Dangers of Internet Search
- How "Phishing" Attacks Can Steal Your Identity--and How to Protect Against Them
- How Zombies and Trojan Horses Attack You--and How to Protect Against Them
- The Security Dangers in Browsers
- How Worms and Viruses Do Their Damage--and How to Protect Against Them
- Wi-Fi Security Dangers and Protectionis
- Bluetooth Security Dangers
- How Instant Messages Pests Work
- How Spam Works--and How to Fight It
- How Denial-of-Service Attacks Bring Down Websites
- How Virtual Private Networks and Encryption Keep You Safe
- How Web Blocking and Parental Controls Work
- How Personal Firewalls and Proxy Servers Protect Your
- Personal Privacy and Security
- How Identity Theft Works
- Credit Card Security
- The Dangers of Data Mining
- The Dangers of Workplace Surveillance
- How Cell Phones Can Be Hacked
- How Biometrics Works
- How Radio Frequency ID Can Invade Your Pirvacy
- How Location Tracking Works
- How DNA Matching Works
- How Airport Scanners and Screening Systems Work
- The Federal Government, Privacy, and Electronic Surveillance
- How Wiretapping and Lie Detectors Work
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Que |
Auteur(s) | Preston Gralla |
Parution | 31/07/2006 |
Nb. de pages | 280 |
Format | 20,5 x 25,5 |
Couverture | Broché |
Poids | 685g |
Intérieur | Quadri |
EAN13 | 9780789735539 |
ISBN13 | 978-0-7897-3553-9 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet