search for books and compare prices
Tables of Contents for Steal This Computer Book
Chapter/Section Title
Page #
Page Count
PART 1: INFORMATION OVERLOAD (LIES, DAMN LIES, AND STATISTICS)
Finding What You Need: The Magic of Search Engines
7
10
Alternative Sources of News and Information
17
12
Censoring Information (We Know What's Best for You)
29
12
Hacktivism: Online Activism
41
10
Pledging Allegiance: Hatred as Patriotism
51
10
Where the Hackers Are
61
12
PART 2: DANGEROUS THREATS ON THE INTERNET
Viruses and Worms
73
14
Trojan Horses: Beware of Geeks Bearing Gifts
87
14
Con Games on the Internet
101
18
Online Stalkers
119
16
PART 3: BREAKING AND ENTERING COMPUTERS
Probing a Target
135
12
Sneaking into a Computer
147
14
Digging in
161
12
PART 4: PROTECTING YOURSELF
Computing on a Shoestring
173
16
Protecting Your Data and Your Privacy
189
18
Waging War on Spam
207
16
Web Bugs, Adware, Pop-Ups, and Spyware
223
14
PART 5: PROTECTING YOUR COMPUTER
Firewalls, Intrusion-Detection Systems, and Honeypots
237
12
Computer Forensics: Recovering and Deleting Data
249
12
Protecting Your Computer
261
80
APPENDICES
Appendix A Software
273
24
Appendix B A Hacker's Gallery of Rogue Tools
297
20
Appendix C A Bit of History: Phone Phreaking and Other Phun
317
14
Appendix D Glossary
331
10
Index
341