Skip to content

How Personal and Internet Security Works

Spend $50 to get a free DVD!

ISBN-10: 0789735539

ISBN-13: 9780789735539

Edition: 2006

Authors: Preston Gralla

List price: $34.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!


How Personal and Internet Security Works is a stunning four-color illustrated title that shows in vivid detail the many dangers faced by those who use the Internet to send or receive email, surf the Web, conduct personal business, use a credit card, or even travel to airports and it also illustrates how those dangers can be solved. Lions, Tiger and Bugs, oh my! Here are just a few stats that can scare most consumers into learning more about the technology behind the unsafe threats to personal and Internet security including:- The U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen.- (2/2005) Americans lost $548 million dollars to identity theft and consumer fraud in 2004.- Fraud and identity theft cost consumers at least $437 million dollars in 2003These fascinating topics are demystified in a way that also provides guidance to those concerned about possible security breeches on their computer and in their lives.
Customers also bought

Book details

List price: $34.99
Copyright year: 2006
Publisher: Pearson Education
Publication date: 5/31/2006
Binding: Paperback
Pages: 288
Size: 8.00" wide x 10.00" long x 0.50" tall
Weight: 1.496
Language: English

Preston Gralla is the author of more than 40 books that have been translated into 20 languages, including Galaxy S 5 The Missing Manual, Windows 8 Hacks, NOOK HD: The Missing Manual, Galaxy Tab: The Missing Manual, The Big Book of Windows Hacks, How the Internet Works, and How Wireless Works. He is a contributing editor to Computerworld, a blogger for ITWorld, and was a founding editor and then editorial director of PC/Computing, executive editor for CNet/ZDNet, and the founding managing editor of PC Week.He has written about technology for many national newspapers and magazines, including USA Today, Los Angeles Times, Dallas Morning News (for whom he wrote a technology column), PC World, and numerous others. As a widely recognized technology expert, he has made many television and radio appearances, including on the CBS Early Show, MSNBC, ABC World News Now, and National Public Radio. Under his editorship, PC/Computing was a finalist for General Excellence in the National Magazine Awards. He has also won the “Best Feature in a Computing Publication” award from the Computer Press Association.Gralla is also the recipient of a Fiction Fellowship from the Massachusetts Cultural Council. He lives in Cambridge, Massachusetts, with his wife (his two children have flown the coop). He welcomes feedback about his books by email at

Internet Security
How the Internet Works
How Hackers Break Into Your PC--and How to Protect Against Them
How Spyware and Anti-Apyware Work
How Websites Invade Your Privacy
The Dangers of Internet Search
How "Phishing" Attacks Can Steal Your Identity--and How to Protect Against Them
How Zombies and Trojan Horses Attack You--and How to Protect Against Them
The Security Dangers in Browsers
How Worms and Viruses Do Their Damage--and How to Protect Against Them
Wi-Fi Security Dangers and Protectionis
Bluetooth Security Dangers
How Instant Messages Pests Work
How Spam Works--and How to Fight It
How Denial-of-Service Attacks Bring Down Websites
How Virtual Private Networks and Encryption Keep You Safe
How Web Blocking and Parental Controls Work
How Personal Firewalls and Proxy Servers Protect Your
Personal Privacy and Security
How Identity Theft Works
Credit Card Security
The Dangers of Data Mining
The Dangers of Workplace Surveillance
How Cell Phones Can Be Hacked
How Biometrics Works
How Radio Frequency ID Can Invade Your Pirvacy
How Location Tracking Works
How DNA Matching Works
How Airport Scanners and Screening Systems Work
The Federal Government, Privacy, and Electronic Surveillance
How Wiretapping and Lie Detectors Work