Hack Proofing Your Identity In The Information Age

1st Edition

Authors: Syngress
Paperback ISBN: 9781931836517
eBook ISBN: 9780080478081
Imprint: Syngress
Published Date: 7th July 2002
Page Count: 512
32.95 + applicable tax
25.99 + applicable tax
41.95 + applicable tax
Unavailable
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


Description

Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide.

Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs.

Key Features

Hot Topic. Hack Proofing Your Identity will provide readers with both simple and advanced steps they can take to protect themselves from cyber-crime. Expert Advice. This book will present security measures gathered from experts in both the federal government and the private sector to help secure your personal information and assets online. Unique Coverage. Hack Proofing Your Identity will be the only book to include security measure for multiple devices like laptops, PDAs and mobile phones to allow users to protect themselves while taking advantage of the newest ways to access the Internet.

Table of Contents

Foreword Chapter 1 Identity Theft: Are You At Risk Introduction Defining Identity Theft Take a Risk Factor Test Why Do They Do It How Do They Get Away with It Recognizing Identity Theft When It Happens
Understanding What Electronic Information Is Private Striving for Theft Prevention Keeping Private Information Private Protecting Your Social Security Number Taking Advantage of Marketing Opt-Out Programs Protecting Your Computer Summary Solutions Fast Track Frequently Asked Questions Chapter 2 Protecting Your Hard Drive Introduction Know Your Computer Temporary Files Temporary Internet Files Deleting Files Permanently for Privacy Other Information that Might be on Your Computer What Are You Protecting Antivirus Software:Your First Line of Defense What You Might Not Know about Antivirus Software What Kinds of Software Are Available Performing Signature Updates Is Your Antivirus Software Working Updating Your Software The Number One Mistake People Make Functionality Vs. Secure Updates Installing Security Patches Beware of the Free Stuff Avoiding Account Sharing Common Reasons, Risks, and Deterrents for Sharing Accounts Creating Multiple Accounts in Windows Creating Multiple Internet Connection Accounts Creating Multiple E-mail Accounts with Outlook Express Using Disk and File Encryption Choosing Strong Passwords Avoiding Weak Passwords Tradeoffs: Using Password Storage Creating Strong Passwords You Can Remember Summary Solutions Fast Track Frequently Asked Questions Chapter 3 Keeping Your E-mail Private Introduction

Details

No. of pages:
512
Language:
English
Copyright:
© Syngress 2002
Published:
Imprint:
Syngress
eBook ISBN:
9780080478081
Paperback ISBN:
9781931836517

About the Author

Reviews

Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide. Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs.