SKIP THE SHIPPING
Use code NOSHIP during checkout to save 40% on eligible eBooks, now through January 5. Shop now.
Register your product to gain access to bonus material or receive a coupon.
You’ve been immersed in the technology since pre-school. You download music, Google your homework, and constantly IM your friends. You check your email before dinner, tweak your MySpace page, and bypass that hardcopy diary for your own 31337 space in the blogosphere. While you’re doing that, you also need to protect yourself. This book is about keeping safe—protecting your data, your identity, and yourself without giving up all the great stuff the Net puts at your fingertips.
Own Your Space is the first serious security book written for and about the Digital Generation. For parents, Own Your Space is an informative look at the inner workings of a world they rarely visit, if at all. For teens, this is a book that meets you where you live. Presented in five sections, Own Your Space explains nasty code, nasty people, blogging, posting personal information, privacy issues, network and firewall concepts, and the tools and tweaks needed for added protection, always conscious of what teens do on today’s Internet.
The book for teens that every parent should read!
You have been immersed in the technology since preschool. You download music, Google your homework, and constantly IM your friends. You check your email before dinner, tweak your MySpace page, and bypass that hardcopy diary for your own 31337 space in the blogosphere. While you’re doing that, you also need to protect yourself. This book is about keeping safe—protecting your data, your identity, and yourself without giving up all the great stuff the Net puts at your fingertips.
Learn how to
Linda McCarthy is a Security Architect in the office of the CTO at Symantec. Linda has been in the security field for over a decade, and has broken into systems around the world to show executives how easy it is to break into their networks. Linda has published seven books on computer security, and is the author of IT Security: Risking the Corporation. Linda also received the Woman of Influence Award in 2004 for computer security, a prestigious award given annually to only four women in the world.
A portion of the proceeds from this book have been designated by the author for nonprofit work to educate teens about Internet security.
Acknowledgments
About the Author
Preface
Chapter 1: Know Your Villains
Chapter 2: Drive-By Malicious Code
Chapter 3: Data Grabbers and Dumpers
Chapter 4: Spy vs. Spy
Chapter 5: Giving Spam the Curb
Chapter 6: Pretenders and Pirates
Chapter 7: Phishing for Dollars
Chapter 8: Taming the Cookie Monster
Chapter 9: Safe Cyber-Shopping
Chapter 10: Private Blogs and Public Places
Chapter 11: Any Port in a Storm
Chapter 12: Look Pa, No Strings!
Chapter 13: Protective Tools
Chapter 14: Tweaks
Appendix A: A Check List for Mom and Dad
Index
Acknowledgments
About the Author
Preface
Chapter 1: Know Your Villains
Chapter 2: Drive-By Malicious Code
Chapter 3: Data Grabbers and Dumpers
Chapter 4: Spy vs. Spy
Chapter 5: Giving Spam the Curb
Chapter 6: Pretenders and Pirates
Chapter 7: Phishing for Dollars
Chapter 8: Taming the Cookie Monster
Chapter 9: Safe Cyber-Shopping
Chapter 10: Private Blogs and Public Places
Chapter 11: Any Port in a Storm
Chapter 12: Look Pa, No Strings!
Chapter 13: Protective Tools
Chapter 14: Tweaks
Appendix A: A Check List for Mom and Dad
Index