Describes how computer viruses are created and spread, and discusses computer harassment, online con artists, protecting data with encryption, and general computer security issues
Revised edition of: Steal this computer book. 2nd ed. 2001
Includes index
pt. 1. Information overload (lies, damn lies, and statistics) -- pt. 2. Dangerous threats on the Internet -- pt. 3. Breaking and entering computers -- pt. 4. Protecting yourself -- pt. 5 Protecting your computer