Atjaunināt sīkdatņu piekrišanu

Privacy, Security, and Cyberspace (Computers, Internet, and Society) [Hardback]

  • Formāts: Hardback, 173 pages, height x width x depth: 236x185x15 mm, weight: 620 g, Illustrations (chiefly col.)
  • Izdošanas datums: 30-May-2012
  • Izdevniecība: Checkmark Books
  • ISBN-10: 0816077568
  • ISBN-13: 9780816077564
Citas grāmatas par šo tēmu:
  • Hardback
  • Cena: 61,15 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Hardback, 173 pages, height x width x depth: 236x185x15 mm, weight: 620 g, Illustrations (chiefly col.)
  • Izdošanas datums: 30-May-2012
  • Izdevniecība: Checkmark Books
  • ISBN-10: 0816077568
  • ISBN-13: 9780816077564
Citas grāmatas par šo tēmu:
Focuses on the legal right to privacy, discusses the need for legislation to protect online privacy, and examines the ways companies try to protect the consumer.
Preface ix
Acknowledgments xiii
Introduction xv
1 Your Right to Privacy
1(13)
Origins of the Fourth Amendment
1(2)
Evolution of Privacy Protections for New Technologies
3(5)
Legal Protection of Electronic Privacy Today
8(1)
The Expectation of Privacy
8(2)
Justice Louis Brandeis, Supreme Court Justice
10(2)
Conclusions
12(2)
2 Computer Viruses: Invisible Threats to Privacy
14(17)
Types of Computer Viruses
15(2)
(In)famous Computer Viruses
17(3)
The Melissa Virus
20(2)
Why Do People Spread Viruses?
22(1)
The Battle against Viruses
23(4)
Robert Tappan Morris, Programmer of an Early Virus
27(1)
Conclusions
28(3)
3 Spyware: Software Snooping on Your Private Data
31(15)
How Spyware Works
32(3)
Examples of Spyware
35(1)
Spyware in the Workplace
36(2)
How to Protect Yourself against Spyware
38(2)
What to Do if Your Computer Is Infected
40(2)
Steve Gibson, Founder of Gibson Research Corporation
42(2)
Conclusions
44(2)
4 Phishing and Social Engineering: Confidence Games Go Online
46(12)
Confidence Games: The Prehistory of Phishing
46(3)
Social Engineering
49(1)
The Technology of Phishing
49(2)
Prominent Phishing Scams
51(1)
The Nigerian Scam
52(1)
How to Protect against Phishing
53(1)
Kevin Mitnick, Computer Security Consultant, Reformed Hacker
54(3)
Conclusions
57(1)
5 Your Personal Information Online: Everyone Is a Public Figure Now
58(13)
The Permanence of Online Records
58(3)
Offline Records Go Online
61(1)
Controlling Access to Online Information
62(1)
Online Data: More Up-to-Date and Obsolete Than Ever
63(1)
Employers and Social Networking Sites
63(1)
Examples of Ways in Which Information Becomes Available Online
64(2)
Robert Ellis Smith, Privacy Advocate
66(2)
Conclusions
68(3)
6 Identity Theft: Protecting Oneself against Imposters
71(14)
Protecting One's Identity
73(2)
Malware, Social Engineering, and Identity Theft
75(1)
Prominent Examples of Identity Theft
76(1)
The Children's Online Privacy Protection Act (COPPA)
77(1)
Not All Web Sites Are Created Equal
78(1)
Password Creation and Management
79(3)
Marc Rotenberg, Privacy Advocate
82(2)
Conclusions
84(1)
7 Keeping Your Data Secure: The Best Offense Is a Good Defense
85(19)
What Is Encryption?
85(2)
Public Key Encryption
87(1)
Encrypting Data on Computers and Online
87(2)
Backup Security
89(2)
Wireless Security
91(1)
Wardriving
92(2)
Laptops, Smart Phones, and Flash Drives: Data on the Move
94(1)
Computing in Public
95(2)
Philip Zimmermann, Author of Pretty Good Privacy Encryption Software
97(3)
The Internet as Soapbox and Big Brother
100(2)
Conclusions
102(2)
8 Databases, Privacy, and Security: Monitoring the Online You
104(22)
Benefits of Databases
108(1)
Gordon Bell, MyLifeBits
109(2)
Invasion of Privacy
111(1)
Reidentification: The Challenge of Keeping Data Anonymous
112(3)
Denial of Opportunity
115(3)
How to Protect Oneself
118(4)
Simson L. Garfinkel, Author, Database Security Expert
122(3)
Conclusions
125(1)
Chronology 126(4)
Glossary 130(7)
Further Resources 137(12)
Index 149