Table of Contents:
-Title Page
-Introduction
-Bibliography
Threats:
-Viruses
-Trojans
-Spyware
-Phishing
-Basic Security
-Free Programs
|
Bibliography
Nichols, Randall. Defending your digital assets against Hackers, Crackers, Spies and Thieves.
New York: McGraw Hill, 2000.
Masci, David. Internet Privacy. Available at: CQResearcher website. March 1st 2005.
Maximum PC Staff The Ultimate Trouble Shooting Guide. August 2004.
Feinstein, Ken. How to Do Everything to Fight Spam, Viruses, Pop-Ups and Spyware New York: McGraw Hill, 2004.
Delio, Michelle. "Spyware on My Machine? So What?" Available at: www.wired.com/news/technology/0,1282,65906,00.html. March 1st 2005.
Edelman, Ben. "Who Profits from Security Holes?" Available at: http://www.benedelman.org/news/111804-1.html. March 1st 2005
Liston, Tom. "Handler's Diary" Available at: http://isc.sans.org/diary.php?date=2004-07-23&isc=00ee9070d060393ec1a20ebfef2b48b7. March 1st 2005.
Kolla, Patrick. "Spybot: Search & Destroy" Available at: http://www.safer-networking.org/en/news/index.html. March 1st 2005.
"Adware, Spyware and other unwanted malware - and how to remove them." Available at: http://www.cexx.org/adware.htm. March 1st 2005.
Consortium of Anti-Spyware Technology Vendors. "C.O.A.S.T." Available at: http://www.coast-info.org/index.htm. March 1st 2005.
Brown, Ann. Cyber Snoops; How to keep them out of your Computer New York: Proquest, 2005.
Goklaborough, Reid. The Benefits and Fear of Cookie Technology New York: Proquest, 2005.
Brain, Marshall. "How Computer Viruses Work." Available at: http://computer.howstuffworks.com/virus1.htm. March 1st 2005.
|
Important Links
Spybot: Search and Destroy
Hi-Jack This
Handler's Diary
Spyware Guide Database
Microsoft Anti-Spyware
Norton Anti-virus
|