Figures | xv | ||||
Sidebars | xix | ||||
Acknowledgments | xxiii | ||||
Foreword, by Vint Cerf | xxv | ||||
About the Web Site | xxix | ||||
Introduction You Can Be Safe Online | 1 | (4) | |||
Chapter 1 Cyberstalking Happened to Me | 5 | (14) | |||
Chapter 2 Words Can Hurt | 19 | (26) | |||
|
19 | (1) | |||
|
20 | (2) | |||
|
22 | (2) | |||
|
24 | (2) | |||
|
26 | (1) | |||
|
27 | (15) | |||
|
42 | (3) | |||
Chapter 3 Spam Not in a Can | 45 | (16) | |||
|
46 | (3) | |||
|
49 | (1) | |||
|
50 | (2) | |||
|
52 | (1) | |||
|
52 | (4) | |||
|
56 | (2) | |||
|
58 | (3) | |||
Chapter 4 Urban Legends and Hoaxes: Can They Possibly Be True? | 61 | (16) | |||
|
62 | (2) | |||
|
64 | (2) | |||
|
66 | (3) | |||
|
69 | (5) | |||
|
74 | (3) | |||
Chapter 5 Scams, Safe Shopping, and Online Banking | 77 | (18) | |||
|
78 | (3) | |||
|
81 | (10) | |||
|
91 | (2) | |||
|
93 | (2) | |||
Chapter 6 Auction Caution | 95 | (22) | |||
|
95 | (12) | |||
|
107 | (1) | |||
|
108 | (4) | |||
|
112 | (5) | |||
Chapter 7 Gone Phishing: Nigerian Scams and More | 117 | (22) | |||
|
117 | (4) | |||
|
121 | (9) | |||
|
130 | (4) | |||
|
134 | (5) | |||
Chapter 8 Where the Heartache Is: Adoption Fraud | 139 | (8) | |||
|
140 | (3) | |||
|
143 | (2) | |||
|
145 | (2) | |||
Chapter 9 Cases of Stolen Identity | 147 | (10) | |||
|
150 | (7) | |||
Chapter 10 Your Personal Life Exposed | 157 | (12) | |||
|
157 | (2) | |||
|
159 | (1) | |||
|
159 | (1) | |||
|
160 | (6) | |||
|
166 | (1) | |||
|
167 | (2) | |||
Chapter 11 Ugly Beasts Lurking Online | 169 | (14) | |||
|
170 | (1) | |||
|
170 | (2) | |||
|
172 | (11) | |||
Chapter 12 A Little Harmful Chat | 183 | (24) | |||
|
183 | (3) | |||
|
186 | (1) | |||
|
186 | (1) | |||
|
187 | (2) | |||
|
189 | (4) | |||
|
193 | (1) | |||
|
193 | (4) | |||
|
197 | (10) | |||
Chapter 13 Lookin' for Love in All the Online Places | 207 | (24) | |||
|
207 | (5) | |||
|
212 | (4) | |||
|
216 | (3) | |||
|
219 | (3) | |||
|
222 | (1) | |||
|
223 | (2) | |||
|
225 | (2) | |||
|
227 | (4) | |||
Chapter 14 Other Ways They Can Get You | 231 | (22) | |||
|
231 | (2) | |||
|
233 | (1) | |||
|
234 | (2) | |||
|
236 | (3) | |||
|
239 | (3) | |||
|
242 | (1) | |||
|
242 | (3) | |||
|
245 | (1) | |||
|
246 | (3) | |||
|
249 | (1) | |||
|
250 | (3) | |||
Chapter 15 Protecting the Children | 253 | (28) | |||
|
258 | (4) | |||
|
262 | (2) | |||
|
264 | (3) | |||
|
267 | (6) | |||
|
273 | (2) | |||
|
275 | (6) | |||
Chapter 16 Office Know-How: Stay Safe in the Workplace | 281 | (16) | |||
|
281 | (4) | |||
|
285 | (2) | |||
|
287 | (2) | |||
|
289 | (8) | |||
Chapter 17 Police Duty: Our Nation's Finest Boot Up | 297 | (16) | |||
|
297 | (2) | |||
|
299 | (1) | |||
|
300 | (1) | |||
|
300 | (1) | |||
|
301 | (1) | |||
|
302 | (1) | |||
|
303 | (2) | |||
|
305 | (4) | |||
|
309 | (1) | |||
|
310 | (3) | |||
Chapter 18 Universities Catch Up with the Net | 313 | (14) | |||
|
316 | (3) | |||
|
319 | (4) | |||
|
323 | (1) | |||
|
324 | (3) | |||
Chapter 19 Encryption Made Easy | 327 | (12) | |||
|
327 | (3) | |||
|
330 | (6) | |||
|
336 | (3) | |||
Chapter 20 Protect Your Computer! | 339 | (26) | |||
|
340 | (1) | |||
|
341 | (4) | |||
|
345 | (5) | |||
|
350 | (3) | |||
|
353 | (4) | |||
|
357 | (2) | |||
|
359 | (6) | |||
Chapter 21 The Basics of Staying Safe Online: A Review | 365 | (20) | |||
|
365 | (11) | |||
|
376 | (9) | |||
Afterword | 385 | (2) | |||
Appendix A Where to Go for Help Online | 387 | (4) | |||
Appendix B Resources | 391 | (32) | |||
Glossary | 423 | (16) | |||
About the Author | 439 | (2) | |||
Index | 441 |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.