
Privacy Defended
Protecting Yourself Online
Gary Bahadur, William Chan, Chris Weber
Résumé
Contents
Introduction.
I. LIFE IN THE DIGITAL AGE: WHY WE WANT AND NEED PRIVACY.
1. The Quest for Privacy in the Information Age.
2. Defining Privacy: Social and Legal Aspects.
3. Privacy Organizations and Initiatives.
II. THE ENEMY IS OUT THERE: THREATS TO INDIVIDUAL PRIVACY.
4. Legal Threats to Individual Privacy.
5. Illegal Threats to Individual Privacy.
III. DANGEROUS TERRITORY: PROTECTING YOUR PRIVACY IN THE ONLINE ENVIRONMENT.
6. Understanding the Online Environment: Addresses,
Domains, andAnonymity.
7. Understanding the Online Environment: Web Surfing and
Online Payment Systems.
8. E-mail Security.
IV. GROUND ZERO: SECURING YOUR PC AGAINST A HOSTILE WORLD.
9. Securing Your Internet Transactions with SSL and
Digital Certificates.
10. Understanding Your PC Operating System and Its Security
Features.
11. Securing Your Standalone PC: Broadband
Connections.
12. Securing Your Standalone PC: Viruses, Chat, and
Encryption.
13. Securing Your Home Network.
V. NEW TARGETS OF OPPORTUNITY: PROTECTING PRIVACY BEYOND THE PC.
14. Securing Your Privacy Using Other Digital Devices.
VI. FIGHTING BACK: WHAT TO DO IF YOUR PRIVACY IS COMPROMISED.
15. Parental Controls.
16. Guarding Your System Against Hacking.
VII. APPENDIXES.
Appendix A. Personal Firewall Software.
Appendix B. Antivirus and Anti-Trojan Horse Software.
Appendix C. Parental Control Technology.
Appendix D. Encryption and Privacy Software.
Appendix E. Selected References.
Index.
L'auteur - Gary Bahadur
Gary Bahadur co-founder and Chief Information Officer of
Foundstone Inc (http://www.foundstone.com), has been
providing security consulting and training services to
Foundstones clients for the past two years and implements
the technical infrastructure necessary provide services to
Foundstones clients. Prior to starting Foundstone with his
partners, Mr. Bahadur performed security consulting and
training services for Fortune 500 companies for Price
Waterhouse and Ernst & Young.
Mr. Bahadur has been involved with numerous ethical hacking
tests and network reviews covering various firewalls, UNIX,
Windows NT, Novell networks, Web servers, Internet
connectivity and SAP security during the past 7 years. Mr.
Bahadur has helped develop the methodologies for network
security reviews and security classes. He is a frequent
speaker at security conferences and writes for a number of
security related publications including Information
Security Magazine and SysAdmin Magazine. Mr. Bahadur holds
a Bachelor of Science degree in Information Systems /
Finance from New York University and is a Certified
Information Systems Security Professional (CISSP).
L'auteur - Chris Weber
Chris Weber is a Security Consultant at Foundstone, Mr.
Weber is adept in many facets of Information Technology and
secure network computing. He has performed numerous ethical
hacking tests, security architecture reviews, and secure
application analyses. Prior to Foundstone, Mr. Weber worked
for VisionAir, performing enterprise network assessments
and mission critical system implementations for some of the
largest Police and Sheriff departments in the USA.
Mr. Webers public work includes course development and
advisory board membership at the SANS Institute. He has
also been a security tutorial honoraria speaker at the
USENIX 10th Annual Security Symposium in 2001, and a
co-instructor at Computer Security Institutes 2001 Network
Security conference in New Orleans.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Que |
Auteur(s) | Gary Bahadur, William Chan, Chris Weber |
Parution | 05/03/2002 |
Nb. de pages | 700 |
Format | 18,5 x 23 |
Couverture | Broché |
Poids | 1161g |
Intérieur | Noir et Blanc |
EAN13 | 9780789726056 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet