Cyber spying tracking your family’s sometimes secret online lives 1st Edition by Ted Fair, Michael Nordfelt, Eric Cole, Sandra Ring – Ebook PDF Instant Download/Delivery: 1931836418, 9781931836418
Full download Cyber spying tracking your family’s sometimes secret online lives 1st Edition after payment
Product details:
ISBN 10: 1931836418
ISBN 13: 9781931836418
Author: Ted Fair, Michael Nordfelt, Eric Cole, Sandra Ring
This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book’s final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in.
Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services.
*Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level.
*Targets a wide audience: personal computer users, specifically those interested in the online activities of their families.
Cyber spying tracking your family’s sometimes secret online lives 1st Table of contents:
Chapter 1: Why Spy?
Introduction to Spying
Pray for Peace, Prepare for War
Ethics of Spying
Spying on Spouses
Spying on Your Children
When You Should Not Spy
Real-World Case Study
Summary
Chapter 2: Spying Basics
Introduction
Goals of Spying
Psychology of Spying
Spying Methodology
Using Overt Monitoring as a Deterrent
Using Covert Spying to Observe Behavior
Demonstration
Case Study: Dangers of Misinterpretation and Distrust
Summary
Chapter 3: Technology Overview: Computer Basics
Introduction
Hardware
Software
Summary
Chapter 4: Network Basics
Introduction
Network Basics
IP Address
Network Traffic
Summary
Chapter 5: Taking Control
Introduction
Cover Your Tracks
Basic Skills
Software You Will Use
Mastering Your Domain
Summary
Chapter 6: Spying on the PC
Introduction
Mission 1: Collect the Basics
Mission 2: Examining the Past
Mission 3: Live for the Present
Mission 4: Prepare for the Future
Mission 5: Look for Hidden Information
Case Study: Expand Your Investigation Beyond the Local Computer
Summary
Chapter 7: Spying on Web Browsing
Introduction
What Is Web Browsing?
What Can You Get from Web Browsing?
Typical Web Browsers
Basic Skills
Collecting Information from Your Target’s Computer
Collecting Information about Your Target from the Network
Summary
Chapter 8: Spying on E-mail
Introduction
Overview of E-mail
Popular E-mail Clients
Web Mail
Collecting E-mail
Case Study: Return to Sender
Summary
Chapter 9: Spying on Chat and Instant Messages
Introduction
What Is Instant Messaging?
Types of Chat and Instant Messaging
Collecting Passwords and Buddy Lists
Collecting Chat and Instant Messages
Impersonation
Summary
Chapter 10: Advanced Techniques
Introduction
Improving Your Skills
Expanding Your Horizons
Summary
Chapter 11: Counterspy: Are You Being Watched?
Introduction
How to Be Sneaky
How to Tell If You Are Being Watched
How to React If You Are a Target
Identifying Who is Spying on You
A Note about Spyware
Case Study: Guilt is for Suckers, Not Spies
People also search for Cyber spying tracking your family’s sometimes secret online lives 1st:
spyware collects your
a cyber privacy parable
the cyber spying glass
we spy on your son and his crush
Tags:
Ted Fair,Michael Nordfelt,Eric Cole,Sandra Ring,spying