How to Stop E-Mail Spam, Spyware, Malware, Computer Viruses and Hackers from Ruining Your Computer or Network: The Complete Guide for Your Home and Work


It seems like everywhere you go on the Internet, there is spam, spyware, and the risk of viruses infecting your computer and ruining your online experience. In businesses alone, according to Nucleus Research Inc., spam costs more than $712 per employee in productivity and computing resources each year. Spyware slows computers, ruins files, and can result in stolen information. According to the same Nucleus Research report, businesses lose more than $70 billion annually because of computer viruses — and the cost ...

See more details below
$14.58 price
(Save 41%)$24.95 List Price
Other sellers (Paperback)
  • All (10) from $1.99   
  • New (6) from $16.22   
  • Used (4) from $1.99   
How to Stop E-Mail Spam, Spyware, Malware, Computer Viruses, and Hackers from Ruining Your Computer or Network: The Complete Guide for Your Home and Work

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$11.23 price


It seems like everywhere you go on the Internet, there is spam, spyware, and the risk of viruses infecting your computer and ruining your online experience. In businesses alone, according to Nucleus Research Inc., spam costs more than $712 per employee in productivity and computing resources each year. Spyware slows computers, ruins files, and can result in stolen information. According to the same Nucleus Research report, businesses lose more than $70 billion annually because of computer viruses — and the cost continues to rise as every major company moves to a fully digital workplace.

Every time you download a computer virus or click on a spam e-mail by accident, you are wasting money, endangering your computer, and risking the loss of personal and business information. This complete, revolutionary book has compiled all of the vital information you need to make sure that you are able to combat the billion dollar risk of incursive software infecting your home and work computers.

With How to Stop E-mail Spam, Spyware, and Computer Viruses from Ruining Your Computer, you will learn why there is so much spam in your inbox, how the spammer thinks, and what the goals of spyware and viruses actually are. Then, you will learn how you can start spam-proofing your inbox by never giving away personal information and using secure e-mail clients. You will learn how companies get spyware onto your hard drive and what you can do to block it from appearing. Learn which viruses have caused the most damage and how they can infect your computer. Then, discover which software is most effective at blocking the download and infestation of viruses onto your hard drives.

You will learn the value of a good firewall, what it does to stop the ill will of spammers and hackers, and what actions you can take to block the breach of your firewall and your computer’s defenses. Learn how to remove spyware from your computer and make sure you are not giving away personal or valuable work information. This guide will also teach you how to lock down your inbox and desktop to keep that software from returning. Find out what to do when you do get a virus and how to return your computer to the state of security it was in beforehand.

Most importantly, with the valued input gathered from interviews with computer security and safety experts, you will learn how you became a target for all that spam. Discover what you are doing that makes it so easy for spammers to fill your inbox and how to safeguard your e-mail. Once you have tackled the source of the problems, as outlined in this book, you will have all the tools you need to combat the incursive and destructive effects of spam, spyware, and computer viruses.

Atlantic Publishing is a small, independent publishing company based in Ocala, Florida. Founded over twenty years ago in the company president’s garage, Atlantic Publishing has grown to become a renowned resource for non-fiction books. Today, over 450 titles are in print covering subjects such as small business, healthy living, management, finance, careers, and real estate. Atlantic Publishing prides itself on producing award winning, high-quality manuals that give readers up-to-date, pertinent information, real-world examples, and case studies with expert advice.  Every book has resources, contact information, and web sites of the products or companies discussed.

This Atlantic Publishing eBook was professionally written, edited, fact checked, proofed and designed. The print version of this book is 288 pages and you receive exactly the same content. Over the years our books have won dozens of book awards for content, cover design and interior design including the prestigious Benjamin Franklin award for excellence in publishing. We are proud of the high quality of our books and hope you will enjoy this eBook version.

Read More Show Less

Product Details

  • ISBN-13: 9781601383037
  • Publisher: Atlantic Publishing Group Inc.
  • Publication date: 12/1/2010
  • Pages: 288
  • Product dimensions: 5.90 (w) x 9.00 (h) x 0.80 (d)

Table of Contents

Foreword 11

Introduction 15

Is This Book for Me? 20

How This Book is Organized 21

Chapter 1 Malware: A Comprehensive Introduction 23

Spyware 27

Adware 27

Viruses 28

Spam 29

Spoofing 30

Phishing 32

Worms 32

Trojans 32

SQL injection 33

Hijack 34

Rootkits 35

Bots 37

Impact of Malware 38

Chapter 2 Computer Viruses: Are You at Risk? 43

Types of Viruses 46

How Viruses Infect Computers 51

Capabilities of a Virus 52

Locations Where a Virus is Most Commonly Found 55

Impact of Viruses on Computer Operating Systems 56

Virus Removal Methods 58

Chapter 3 Antivirus Solutions & Defense 63

Chapter 4 Spam, Spoofing, Phishing, & E-Mail Hoaxes: What They Are and How to Block Them 83

Spoofing 84

Phishing 87

Whaling 91

Pharming 91


Hoaxes 99

Spam Virus E-Mails 102

E-Mail Relaying 103

Spam Tools 104

The 10 Most Common E-mail Scams and How to Defend Against Them 109

Chapter 5 Detecting and Countering Malware & Spyware 121

Viruses 125

Worms 125

Trojan Horse 127

Rootkits 130

Adware 134

Crimeware 135

Grayware 136

Denial of Service Attack 137

Robots 139

SQL Injection Attack 139

Cross-Site Scripting (XSS) 140

Cross-Site Forgery Request 141

Relay Attack 142

Chapter 6 Web Browsers, Pop-Up Windows, & How to Surf the Web Safely 153

Web Browsers 158

Windows 7 Parental Controls 162

Chapter 7 Firewalls: A Comprehensive Introduction 165

Basics of Information Security 167

Internet Threats 167

What is a Firewall? 168

How do Firewalls Work? 170

Virtual Private Networks 172

Types of Firewalls 172

Firewalls: Home and Business Networks 174

An Introduction to Hardware and Software Firewall Products 175

Chapter 8 Hackers: How to Defend Against Hacks & Other Attacks 185

Methods Hackers Use to Attack 187

Why do People Hack? 196

Protections Against Hacking 197

Chapter 9 Network Security: How to Protect and Secure your Home or Small-business Network 199

Securing Your Home Network 201

Securing Your Business Network 203

Security in Windows XP Networks 205

Security in WindowsVista Networks 208

Security in Windows 7 Networks 210

How are Windows 7 Networking and Network Security Improved? 212

Hacking into a Network 216

Advanced Network Monitoring and Protection 219

Chapter 10 Wireless Network Security: How to Secure Your Wireless Network 223

Wireless PANs 229

Wireless LANs 229

Wireless WANs 230

Wireless Technologies 230

Wireless Security 233

Security of the Physical System 233

Privacy 234

Hacking a Wireless System 238

Securing Your Wireless System 241

Wireless Networking in Windows XP 245

Wireless Networking in Windows Vista 246

Wireless Networking in Windows 7 247

Chapter 11 Software Products to Protect Your Computers & Networks 251

Internet Security Suites 252

Antivirus Software 257

Antispyware Software 261

Antispam Software 263

Specialty Tools and Malware Protection 265

Personal Firewall Software 266

Network Monitoring Software 270

User Activity-Monitoring Software 270

Network Detection and Monitoring (Including Wireless) 272

Conclusion 273

Glossary 277

Author Biography 283

Bibliography 285

Index 287

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 Customer Reviews
  • Posted February 4, 2011

    more from this reviewer

    Great book

    The title alone, was the reason why I wanted to review this book. Who hasn't had some kind of e-mail spam in their inbox? In this book, you'll learn how spammers think and what the goals of spyware and virus are.

    In the news, you always hear about government and big business being cyber attacked, but you don't hear much about small business or the average person who are attacked everyday. Hackers send out their virus to either test their virus or to try to steal personal and private information from your computer. In other words, hackers are thieves.

    In the book, you'll learn all there is to know about malware, spyware, adware, viruses, spam, spoofing, phishing worms, trojans, SQL injection, Hijack, Rootkits, Bots, and the impact of Malware. You'll read about the 10 most Common E-mail Scams and How to Defend Against Them.

    Honestly, I already knew quite a bit on the subject matter, and if you are also well informed, then this book might not be for you. Someone new to computers, or has little knowledge about protecting your computer, will find this book interesting. There are plenty of links listed for paying and free firewalls, virus scans, and other useful information to keep your computer safe from cyber attacks.

    *I would like to thank the Atlantic Publishing Group for sending me a copy to review.

    Was this review helpful? Yes  No   Report this review
  • Posted January 19, 2011

    Important book to have

    I believe this is the most important book on the market for anyone that has a computer and is connected to the Internet. (Statistics show 7 billion world-wide.) Written in easy, lay-language Bruce C. Brown gives us an understanding of the various terms associated to intrusions and theft of data. He also includes information on detection and gives safe websites for more information or software protection.

    Brown states that "...there is no single solution to the issue of protecting against hackers and their nefarious deeds, and it is never possible to be 100 percent hacker-proof." This statement in itself urges us to install a variety of defense mechanisms on our computers.

    On a personal note, being previously hacked while using other systems, I was pleased to read that "Windows 7 is without a doubt the most secure and stable version of Windows ever produced." I find it sad that we have to be so aware and protective because of wicked people wanting to hack into our lives for monetary or malicious gain. However, with knowledge gained through books like this we can become cognizant of what we need to do ourselves.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 2 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)