Cart
Free US shipping over $10
Proud to be B-Corp

Hack Proofing Your Identity In The Information Age Syngress

Hack Proofing Your Identity In The Information Age By Syngress

Hack Proofing Your Identity In The Information Age by Syngress


6,23 $
Condition - Good
Only 1 left

Summary

Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. This work provides instruction for how to secure your personal information on multiple devices. It includes simple measures as well as advanced techniques gleaned from experts who have years of experience with identity theft and fraud.

Faster Shipping

Get this product faster from our US warehouse

Hack Proofing Your Identity In The Information Age Summary

Hack Proofing Your Identity In The Information Age by Syngress

Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide. Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs.

About Syngress

Neal O'Farrell is CEO of Hackademia, a firm focused on security education. He's a twenty-year veteran of information security, former hacker, and original Code Rebel. He's also editor of The Zone, the security newsletter publishedby Internet security firm Zone Labs, where his unique take on cybercrime is dispensed to nearly 3 million subscribers across more than 100 countries every month. Neal is host of the Breach of Trust Security Briefings for Lawyers and speaks on Internet security issues to audiences around the nation. Neal lives in San Ramon, CA.

Table of Contents

Foreword Chapter 1 Identity Theft: Are You At Risk Introduction Defining Identity Theft Take a Risk Factor Test Why Do They Do It How Do They Get Away with It Recognizing Identity Theft When It Happens Understanding What Electronic Information Is Private Striving for Theft Prevention Keeping Private Information Private Protecting Your Social Security Number Taking Advantage of Marketing Opt-Out Programs Protecting Your Computer Summary Solutions Fast Track Frequently Asked Questions Chapter 2 Protecting Your Hard Drive Introduction Know Your Computer Temporary Files Temporary Internet Files Deleting Files Permanently for Privacy Other Information that Might be on Your Computer What Are You Protecting Antivirus Software:Your First Line of Defense What You Might Not Know about Antivirus Software What Kinds of Software Are Available Performing Signature Updates Is Your Antivirus Software Working Updating Your Software The Number One Mistake People Make Functionality Vs. Secure Updates Installing Security Patches Beware of the Free Stuff Avoiding Account Sharing Common Reasons, Risks, and Deterrents for Sharing Accounts Creating Multiple Accounts in Windows Creating Multiple Internet Connection Accounts Creating Multiple E-mail Accounts with Outlook Express Using Disk and File Encryption Choosing Strong Passwords Avoiding Weak Passwords Tradeoffs: Using Password Storage Creating Strong Passwords You Can Remember Summary Solutions Fast Track Frequently Asked Questions Chapter 3 Keeping Your E-mail Private Introduction E-mail Privacy Is Not Just about Spam How E-mail Services Work Big Brother and Your E-mail How E-mails Can Get Lost Understanding Spam E-mail Attacks Are Not Just about Viruses E-mail Attachments How Your E-mail Can Be Hijacked E-mail Interceptions Recognizing Mail Scams Solicitations and Chain Letters Spam as Social Engineering Using Antivirus Protection for E-mail Hiding Your E-mail Identity Knowing What's in Your E-mail Headers Knowing What Your Chat Says about You Setting Up Anonymous E-mail E-mail Encryption Made Simple Using Pretty Good Privacy (PGP) with Microsoft Outlook Using Personal Certificates with Netscape Verifying E-mail Senders in Outlook Importing a Personal Certificate File into Opera Choosing a Secure E-mail Provider Using Encrypted Web-based E-mail Summary Solutions Fast Track Frequently Asked Questions Chapter 4 Self Defense on the Web Introduction Understanding Risk on the Web Learning to Be Street Smart on the Web Understanding the Privacy Policy Managing Risk on the Web Managing Passwords Protecting Your Purchasing Power Anonymous Web Surfing Improving Browser Safety Updating Your Browser Software Putting Browser Security Features to Work Covering Your Internet Footprints Deleting Hidden Information About You Opting Out of Ad-ware Cookies Summary Solutions Fast Track Frequently Asked Questions Chapter 5 Connecting to the Internet Safely Introduction Different Connections, Different Risks Understanding Network Terminology Dial-up Connections Always-on Broadband Understanding Data Interception Taking Precautions Setting Permissions for Shared Drives and Files Registering Your Domain.com Turning Off Unneeded Services Securing Your Personal Web Server Firewalls for the Home Personal Firewalls for Home Office Use Network Firewalls for Home Office Use Using Common Firewall Configuration Features Summary Solutions Fast Track Frequently Asked Questions Chapter 6 Are Your Kids Putting You at Risk Introduction Raising Children in the Digital Age Keeping Clear Online Identities within Families Supervising Online Activities Channeling a Child's Interest in Hacking Identifying Risky Software and Risky Behavior Chat Programs Web Forums and Newsgroups Massive Multiplayer Online Games File-Sharing Software Hacking Tools Monitoring Online Activities Parental Contracts Application Logging Browser Activity Logging Keystroke Logging Screen Imaging Avoiding Monitoring Pitfalls Summary Solutions Fast Track Frequently Asked Questions Chapter 7 If You Become a Victim Introduction Taking Immediate Action Step 1: Filing Police Reports Step 2: Reporting Fraud and Stolen Accounts Step 3: Notifying the Federal Trade Commission (FTC) Managing Other Fraud Situations Managing the Fallout Contacting Credit Bureau Services Knowing When to Seek Legal Help Keeping Records Locating Government Resources Statutes in Your State Federal Trade Commission Other Suggested Resources Privacy Rights Advocates Summary Solutions Fast Track Frequently Asked Questions Chapter 8 Configuring Your Browser and Firewall Introduction Managing Your Web Browser's Security Features Internet Explorer Version 6 Netscape 6.2 Opera 6 Configuring Your Home Firewall BlackICE Defender for Windows Zone Alarm Pro for Windows Siemens Speedstream SS2602 DSL/Cable Router Applications Port List Index

Additional information

CIN1931836515G
9781931836517
1931836515
Hack Proofing Your Identity In The Information Age by Syngress
Used - Good
Paperback
Syngress Media,U.S.
20020707
512
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in good condition, but if you are not entirely satisfied please get in touch with us

Customer Reviews - Hack Proofing Your Identity In The Information Age