Home > Store

How Personal & Internet Security Works

Register your product to gain access to bonus material or receive a coupon.

How Personal & Internet Security Works

eBook (Adobe DRM)

  • Sorry, this book is no longer in print.
  • About Adobe DRM eBooks
  • This eBook requires the free Adobe® Digital Editions software.

    Before downloading this DRM-encrypted PDF, be sure to:

    • Install the free Adobe Digital Editions software on your machine. Adobe Digital Editions only works on Macintosh and Windows, and requires the Adobe Flash Player. Please see the official system requirements.
    • Authorize your copy of Adobe Digital Editions using your Adobe ID (select AdobeID as the eBook vendor). If you don't already have an Adobe ID, you can create one here.
Not for Sale


  • Copyright 2006
  • Dimensions: 8" x 10"
  • Edition: 1st
  • eBook (Adobe DRM)
  • ISBN-10: 0-7686-6722-4
  • ISBN-13: 978-0-7686-6722-6

In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft and consumer fraud in 2004. Don't allow yourself to become a part of the statistics!

How Personal and Internet Security Works illustrates in vivid detail the many dangers faced by those who use the Internet to send or receive email, surf the Web, conduct personal business, use a credit card, or even travel to airports and how those dangers can be solved. You'll also get detailed explanations of Internet privacy issues such as spyware, phishing, identity theft, data mining, biometrics, and security cameras, as well as Homeland Security issues such as airport scanning and terrorist screening.

Sample Content

Table of Contents

Introduction    viii

Part I    Internet Security    2

Chapter 1    How the Internet Works    8

Chapter 2    How Hackers Break Into Your PC--and How to Protect Against Them    14

Chapter 3    How Spyware and Anti-Apyware Work    22

Chapter 4    How Websites Invade Your Privacy    42

Chapter 5    The Dangers of Internet Search    52

Chapter 6    How "Phishing" Attacks Can Steal Your Identity--and How to Protect Against Them    58

Chapter 7    How Zombies and Trojan Horses Attack You--and How to Protect Against Them    66

Chapter 8    The Security Dangers in Browsers    76

Chapter 9    How Worms and Viruses Do Their Damage--and How to Protect Against Them    82

Chapter 10  Wi-Fi Security Dangers and Protectionis    90

Chapter 11  Bluetooth Security Dangers    110

Chapter 12  How Instant Messages Pests Work    116

Chapter 13  How Spam Works--and How to Fight It    126

Chapter 14  How Denial-of-Service Attacks Bring Down Websites    142

Chapter 15  How Virtual Private Networks and Encryption Keep You Safe    150

Chapter 16  How Web Blocking and Parental Controls Work    160

Chapter 17  How Personal Firewalls and Proxy Servers Protect Your    166

Part 2    Personal Privacy and Security    178

Chapter 18  How Identity Theft Works    182

Chapter 19  Credit Card Security    190

Chapter 20  The Dangers of Data Mining    198

Chapter 21  The Dangers of Workplace Surveillance    204

Chapter 22  How Cell Phones Can Be Hacked    210

Chapter 23  How Biometrics Works    218

Chapter 24  How Radio Frequency ID Can Invade Your Pirvacy    224

Chapter 25  How Location Tracking Works    230

Chapter 26  How DNA Matching Works    236

Chapter 27  How Airport Scanners and Screening Systems Work    242

Chapter 28  The Federal Government, Privacy, and Electronic Surveillance    248

Chapter 29  How Wiretapping and Lie Detectors Work    256

                    Index    264


Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership