Own Your Space: Keep Yourself and Your Stuff Safe Online

Front Cover
Pearson Addison Wesley Prof, 2006 - Juvenile Nonfiction - 228 pages
1 Review

The book for teens that every parent should read!

 

You have been immersed in the technology since preschool. You download music, Google your homework, and constantly IM your friends. You check your email before dinner, tweak your MySpace page, and bypass that hardcopy diary for your own 31337 space in the blogosphere. While you’re doing that, you also need to protect yourself. This book is about keeping safe—protecting your data, your identity, and yourself without giving up all the great stuff the Net puts at your fingertips.

 

Learn how to 

  • Kill viruses, worms, Trojans, and spyware
  • Give Spam the curb and smash web bugs
  • Understand just how public your “private” blogs are
  • Keep wireless freeloaders off your network
  • Safeguard your parents’ credit card and financial data
  • Understand what tools you need and how to tweak them

 

Linda McCarthy is a Security Architect in the office of the CTO at Symantec. Linda has been in the security field for over a decade, and has broken into systems around the world to show executives how easy it is to break into their networks. Linda has published seven books on computer security, and is the author of IT Security: Risking the Corporation. Linda also received the Woman of Influence Award in 2004 for computer security, a prestigious award given annually to only four women in the world.

 

A portion of the proceeds from this book have been designated by the author for nonprofit work to educate teens about Internet security.

 

Acknowledgments

About the Author

Preface

Chapter 1: Know Your Villains

Chapter 2: Drive-By Malicious Code

Chapter 3: Data Grabbers and Dumpers

Chapter 4: Spy vs. Spy

Chapter 5: Giving Spam the Curb

Chapter 6: Pretenders and Pirates

Chapter 7: Phishing for Dollars

Chapter 8: Taming the Cookie Monster

Chapter 9: Safe Cyber-Shopping

Chapter 10: Private Blogs and Public Places

Chapter 11: Any Port in a Storm

Chapter 12: Look Pa, No Strings!

Chapter 13: Protective Tools

Chapter 14: Tweaks

Appendix A: A Check List for Mom and Dad

Index

 

From inside the book

What people are saying - Write a review

User Review - Flag as inappropriate

Microsoft is giving away this book for free (as an ebook).
See: http://www.microsoft.com/downloads/en/details.aspx?FamilyID=87583728-ef14-4703-a649-0fd34bd19d13&displayLang=en

Contents

Know Your Villains
5
DriveBy Malicious Code
9
Data Grabbers and Dumpers
35
Copyright

13 other sections not shown

Common terms and phrases

About the author (2006)

Linda McCarthy is an architect in the office of the CTO at Symantec. Linda started her security career breaking into computers on Sun Microsystems’ network over a decade ago. Linda has broken into systems around the world to show executives how easy it was to break into their networks. Linda was the vice president of Systems Engineering for Recourse  technologies and is founder of Network Defense. Linda has published seven books on computer security, and is the author of IT Security Risking the Corporation. Linda also received the Woman of Influence Award for computer security, a prestigious award given annually to only four women in the world.

 

Bibliographic information