This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in. Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. *Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. *Targets a wide audience: personal computer users, specifically those interested in the online activities of their families.Today, cellular phones have Web cams, still cameras, Internet surfing, e-mail, and IM capability built directly into them. ... Given the wide assortment of carriers ( i.e., Cingular, Verizon, NexTel, Sprint, T- Mobile, and so on) in the U.S., there isanbsp;...
|Title||:||Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives|
|Author||:||Eric Cole, Michael Nordfelt, Sandra Ring, Ted Fair|
|Publisher||:||Syngress - 2005-03-15|