Nova Publishers
My Account Nova Publishers Shopping Cart
HomeBooksSeriesJournalsReference CollectionseBooksInformationSalesImprintsFor Authors
  Top » Catalog » Books » Internet » My Account  |  Cart Contents  |  Checkout   
Quick Find
Use keywords to find the product you are looking for.
Advanced Search
What's New? more
Central Asia: Perspectives and Present Challenges
Shopping Cart more
0 items
Shipping & Returns
Privacy Notice
Conditions of Use
Contact Us
01.Mobile Telephones: Networks, Applications, and Performance
02.Internet and Suicide
03.Academic Librarianship in the 21st Century
04.Cybersecurity, Botnets, and Cyberterrorism
05.Cyberterrorism and Computer Attacks
06.Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws
07.Cyberinfrastructure Technologies and Applications
08.The E-Society
09.Building an Intelligent Assisted Instructional Design System
10.Data Security Breaches: Context and Incident Summaries
Notifications more
NotificationsNotify me of updates to Spyware
Tell A Friend
Tell someone you know about this product.
Retail Price: $79.00
10% Online Discount
You Pay:

Editors: John S. Yang
Book Description:
The term “spyware” is not well defined. Generally it is used to refer to any software that is downloaded onto a person’s computer without their knowledge. Spyware may collect information about a computer user’s activities and transmit that information to someone else. It may change computer settings, or cause “pop-up” advertisements to appear (in that context, it is called “adware”). Spyware may redirect a Web browser to a site different from what the user intended to visit, or change the user’s home page. A type of spyware called “keylogging” software records individual keystrokes, even if the author modifies or deletes what was written, or if the characters do not appear on the monitor. Thus, passwords, credit card numbers, and other personally identifiable information may be captured and relayed to unauthorized recipients. Some of these software programs have legitimate applications the computer user wants. They obtain the moniker “spyware” when they are installed surreptitiously, or perform additional functions of which the user is unaware. Users typically do not realize that spyware is on their computer. They may have unknowingly downloaded it from the Internet by clicking within a website, or it might have been included in an attachment to an electronic mail message (e-mail) or embedded in other software. According to a survey and tests conducted by America Online and the National Cyber Security Alliance, 80% of computers in the test group were infected by spyware or adware, and 89% of the users of those computers were unaware of it. The Federal Trade Commission (FTC) issued a consumer alert on spyware in October 2004. It provided a list of warning signs that might indicate that a computer is infected with spyware, and advice on what to do if it is.This new book helps shed light on this insidious nightmare created by members of the human race to wreck havoc on the remainder.

Table of Contents:

Chapter 1. Spyware: Background and Policy
(Marcia S. Smith)

Chapter 2. Monitoring Software on Your PC:
Spyware, Adware, and Other Software
(Staff Report)


   Binding: Paper
   Pub. Date: 2005
   ISBN: 1-59454-648-7
   Status: AV
Status Code Description
AN Announcing
FM Formatting
PP Page Proofs
FP Final Production
EP Editorial Production
PR At Prepress
AP At Press
AV Available
Special Focus Titles
01.Violent Communication and Bullying in Early Childhood Education
02.Cultural Considerations in Intervention with Women and Children Exposed to Intimate Partner Violence
03.Chronic Disease and Disability: The Pediatric Lung
04.Fruit and Vegetable Consumption and Health: New Research
05.Fire and the Sword: Understanding the Impact and Challenge of Organized Islamism. Volume 2

Nova Science Publishers
© Copyright 2004 - 2020