Computer Security and Safety,Ethics,and Privasy
by tossaporn malaivichit
1. New node
2. INTERNET AND NETWORK ATTACKS
2.1. Computer Viruses,Worms,Trojan Horses,and Rootkits
2.2. Safeguards against Computer Viruses and Other Malware
2.3. Botnets
2.4. Denial of Service Attacks
2.5. Back Doors
2.6. Spoofing
2.7. Saftguards against Botnets,Dos/DDos Attacks,Back Doors,and Spoofing
2.8. Firewalls
2.9. Intrusion Detection Software
2.10. Honeypots
3. ETHICS AND SOCIETY
3.1. Information Accuracy
3.2. Intellectual Property Rights
3.3. Codes of conduct
3.4. Green Computing
4. HEALTH CONCERNS OF COMPUTER USE
5. CHAPTER SUMMARY
6. HARDWARE THEFT AND VANDALISM
6.1. Safeguards againnst Hardware Theft and Vandalism
7. INFORMATION THEFT
8. HIGH-TECH TALK
9. INFORMATION PRIVACY
9.1. Electronic Profiles
9.2. Cookies
9.3. Spam
9.4. Phishing
9.5. Spyware and Adware
9.6. Privacy Laws
9.7. Social Engineering
9.8. Employee Monitoring
9.9. Content Filtering
10. TECHNOLOGY TRAILBLAZERS
10.1. Richard Stallman
11. COMPANIES ON THE CUTTING EDGE
11.1. Mcafee
11.2. Symantec
12. WIRELESS SECURITY
13. UNAUTHORIZED ACCESS AND USE
13.1. Safeguards against Unauthorized Access and Use
13.2. New node
13.3. Identifying and Authenticating Users
14. BACKING UP-THE ULTIMATE SAFEGUARD