Skip to content

How Personal and Internet Security Works

Spend $50 to get a free DVD!

ISBN-10: 0789735539

ISBN-13: 9780789735539

Edition: 2006

Authors: Preston Gralla

List price: $34.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!


How Personal and Internet Security Works is a stunning four-color illustrated title that shows in vivid detail the many dangers faced by those who use the Internet to send or receive email, surf the Web, conduct personal business, use a credit card, or even travel to airports and it also illustrates how those dangers can be solved. Lions, Tiger and Bugs, oh my! Here are just a few stats that can scare most consumers into learning more about the technology behind the unsafe threats to personal and Internet security including:- The U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen.- (2/2005)…    
Customers also bought

Book details

List price: $34.99
Copyright year: 2006
Publisher: Pearson Education
Publication date: 5/31/2006
Binding: Paperback
Pages: 288
Size: 8.00" wide x 10.00" long x 0.50" tall
Weight: 1.496
Language: English

Preston Gralla is the author of more than 40 books that have been translated into 20 languages, including Galaxy S 5 The Missing Manual, Windows 8 Hacks, NOOK HD: The Missing Manual, Galaxy Tab: The Missing Manual, The Big Book of Windows Hacks, How the Internet Works, and How Wireless Works. He is a contributing editor to Computerworld, a blogger for ITWorld, and was a founding editor and then editorial director of PC/Computing, executive editor for CNet/ZDNet, and the founding managing editor of PC Week.He has written about technology for many national newspapers and magazines, including USA Today, Los Angeles Times, Dallas Morning News (for whom he wrote a technology column), PC World,…    

Internet Security
How the Internet Works
How Hackers Break Into Your PC--and How to Protect Against Them
How Spyware and Anti-Apyware Work
How Websites Invade Your Privacy
The Dangers of Internet Search
How "Phishing" Attacks Can Steal Your Identity--and How to Protect Against Them
How Zombies and Trojan Horses Attack You--and How to Protect Against Them
The Security Dangers in Browsers
How Worms and Viruses Do Their Damage--and How to Protect Against Them
Wi-Fi Security Dangers and Protectionis
Bluetooth Security Dangers
How Instant Messages Pests Work
How Spam Works--and How to Fight It
How Denial-of-Service Attacks Bring Down Websites
How Virtual Private Networks and Encryption Keep You Safe
How Web Blocking and Parental Controls Work
How Personal Firewalls and Proxy Servers Protect Your
Personal Privacy and Security
How Identity Theft Works
Credit Card Security
The Dangers of Data Mining
The Dangers of Workplace Surveillance
How Cell Phones Can Be Hacked
How Biometrics Works
How Radio Frequency ID Can Invade Your Pirvacy
How Location Tracking Works
How DNA Matching Works
How Airport Scanners and Screening Systems Work
The Federal Government, Privacy, and Electronic Surveillance
How Wiretapping and Lie Detectors Work