Synopses & Reviews
Protect your children from dangers that lurk on the Internet. Learn to identify the real threats--be they pedophiles, cyber-stalkers, hackers, spyware, viruses, or adware--and formulate an effective protection plan. Choose the best software for your needs and your budget from the book’s independent review of firewalls, web filters, anti-virus products, and more. Plus, a companion Web site hosted by the author includes updated data and information. Get FREE eTrust EZ Antivirus Software for ONE YEAR with Purchase of This Book--a $29.95 USD value.
"Johnson cofounded one of Australia's first IT companies and is an expert on Internet security. When he became a father in 2002, he realized his young daughter would soon be tooling around online and would inevitably encounter inappropriate spam messages, among other hazards. He promptly founded an information Web site for parents to keep their kids safe online, which then begot this comprehensive guide. The Web is still a 'wild, undiscovered, and unregulated frontier,' Johnson says, a tool pedophiles use to look for victims. Nearly 90% of kids encounter pornography online while doing their homework, he warns. The good news is parents can take steps to protect their children so they may safely and effectively use the Internet, which Johnson presents in spite of the dangers as essential for contemporary learning. Most importantly, Johnson asserts, parents should educate their children (e.g., tell them not to give out personal information online), monitor computer use (place the computer in a shared place, not in a child's bedroom) and buy computer software to filter and protect. He suggests five programs that parents should install and walks readers through individual products, explaining the pros and cons and making recommendations. Rather than offering a diatribe on the dangers of the Web, Johnson offers a practical, well-researched guide to help parents minimize the Web's potential drawbacks." Publishers Weekly (Copyright 2004 Reed Business Information, Inc.)
Written by a parent for other parents, this invaluable resource shows how to protect children from lurking threats on the Internet--pedophiles, cyber-stalkers, viruses, hackers, spyware, and adware. It provides independent review of 27 different types of software (firewalls, filters, etc.) and includes further links to products and information on a bonus Web site.
About the Author
Simon Johnson (Victoria, Australia) has 10 years experience as an IT security professional with a number of organizations and government departments. He co-founded and managed Shake Communications in 1997, an IT security business. In 1998 he co-founded SecuritySearch.Net, which at the time, was the largest IT security portal on the Internet. SecuritySearch.Net received more than 155,000 page views per month and sent free security newsletters to more than 16,000 subscribers worldwide, per week. The site was sold in 2002 to US security firm GFI. The newsletter subscription arm of the business was sold to US security firm, Relevant Technologies. Johnson has been interviewed in television and print media on IT Security related topics, including Business2.0, Computerworld, Corporate Risk, CNET News.com, Internetnews.com, Newswire, SBS World News, TechWeb, The Age, Wired Magazine and ZDNet News. He’s written content for Total Surveillance by John Parker (Piatkas Publishing UK, 2000) and reviewed the business and e-commerce chapters in the book, Internet and World WideWeb by Deitel (Prentice Hall, 2002).
Table of Contents
Part I: Real Threats to Your Children on the Internet and What You Can Do about Them
Chapter 1: What Is the Internet?
Chapter 2: What Are the Threats to Your Children and How Serious Are They?
Chapter 3: How to Avoid and Reduce the Risks to Your Kids on the Internet
Part II: The Best (Not Necessarily the Most Expensive) Software to Protect Your Kids
Chapter 4: Content-Filtering Software
Chapter 5: Using Filtering Software to Keep Out the Junk Mail
Chapter 6: Internet Firewall Software
Chapter 7: Antivirus Software
Chapter 8: Malicious Software Detection
Chapter 9: Putting Your Defense into Place
Appendix: Spyware and Adware