Protecting Yourself Online: The Definitive Resource on Safety, Freedom, and Privacy in Cyberspace


Like any new frontier, cyberspace offers both exhilarating possibilities and unforeseen hazards. As personal information about us travels the globe on high-speed networks, often with neither our knowledge nor our consent, a solid understanding of privacy and security issues is vital to the preservation of our rights and civil liberties. In reaping the benefits of the information age while safeguarding ourselves from its perils, the choices we make and the precedents we establish today will be central in defining ...
See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (12) from $1.99   
  • New (1) from $74.95   
  • Used (11) from $1.99   
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any coupons and promotions
Seller since 2008

Feedback rating:



New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.


Ships from: Chicago, IL

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Sort by
Sending request ...


Like any new frontier, cyberspace offers both exhilarating possibilities and unforeseen hazards. As personal information about us travels the globe on high-speed networks, often with neither our knowledge nor our consent, a solid understanding of privacy and security issues is vital to the preservation of our rights and civil liberties. In reaping the benefits of the information age while safeguarding ourselves from its perils, the choices we make and the precedents we establish today will be central in defining the future of the electronic frontier.

Since 1991, the non-profit Electronic Frontier Foundation (EFF) has worked to protect freedoms and advocate responsibility in new media and the online world. In "Protecting Yourself Online," Robert Gelman has drawn on the collective insight and experience of EFF to present a comprehensive guide to self-protection in the electronic frontier. In accessible, clear-headed language, "Protecting Yourself Online" addresses such issues as:

avoiding spam (junk mail) spotting online scams and hoaxesprotecting yourself from identity theft and fraudguarding your email privacy (and knowing when you can't)assessing the danger of viruseskeeping the net free of censorship and safe for your childrenprotecting your intellectual property

Produced by the leading civil libertarians of the digital age, and including a foreword by one of the most respected leaders in global business and the cyberworld, Esther Dyson, "Protecting Yourself Online" is an essential resource for new media newcomers and old Internet hands alike.

Read More Show Less

Product Details

  • ISBN-13: 9780062515124
  • Publisher: HarperCollins Publishers
  • Publication date: 4/1/1998
  • Edition description: 1 ED
  • Edition number: 1
  • Pages: 224
  • Product dimensions: 5.50 (w) x 8.50 (h) x 0.56 (d)

Meet the Author

Robert Gelman is a writer, editor, musician, interactive media developer, and event producer, with his roots in the performing arts. His company, BG and Associates, provides audio and other content for companies such as Mindscape Entertainment, Disney, and America Online.

He serves as a contributing editor to InterActivity Magazine and is a regular contributor to newspapers and journals on subjects of interest to interactive media developers.

He was co-founder and producer of the seminal CyberArts International conferences and festivals, producer of the Digital Be-In, and dozens of other live high-technology events. He is a judge for the Global Information Infrastructure Awards and is a fellow of the Seybold Institute.

For those interested in a digest of views from many corners about cyber-rights and responsibilities, he offers a free email-delivered newsletter.

Read More Show Less

Read an Excerpt

Your Role on the Electronic Frontier

Determining the Future of the Internet
The Internet, though the main focus of this book, is not the limit of its scope. Cellular phones, pagers, and handheld communications devices are all part of the topography of the electronic frontier. Each has its own unique properties and carries its own set of challenges for us as users, developers, or regulators.
To understand our respective roles in the realm of cyberspace, it helps to know a little about what the terrain is like here--what makes up the infrastructure, the regulatory environment, the user-base. As we survey that terrain, a little history is helpful.

How the Internet Came to Be
In the 1960s, researchers began experimenting with linking computers to each other and to people through telephone hookups, using funds from the U.S. Defense Department's Advanced Research Projects Agency (arpa). arpa wanted to see if computers in different locations could be linked using a new technology known as "packet switching." This technology, in which data meant for another location is broken up into little pieces, each with its own "forwarding address," had the promise of letting several users share just one communications line. Just as important, from arpa's viewpoint, was that this allowed for creation of networks that could automatically route data around downed circuits or computers. arpa's goal was not the creation of today's international computer-using community, but development of a data network that could survive a nuclear attack.
Previous computer-networking efforts had required a line between each computer on the network, sort of like a one-tracktrain route. The packet system allowed for creation of a data highway in which large numbers of vehicles could essentially share the same lane. Each packet was given the computer equivalent of a map and a time stamp so that it could be sent to the right destination, where it would then be reassembled into a message the computer or a human could use.
This system allowed computers to share data and the researchers to exchange electronic mail (or email). In itself, email was something of a revolution, offering the ability to send detailed letters at the speed of a phone call.
As this system, known as arpanet, grew, some enterprising college students (and one high-schooler) developed a way to use it to conduct online conferences. These started as science-oriented discussions, but they soon branched out into virtually every other field as people recognized the power of being able to "talk" to hundreds, or even thousands, of people around the country.
In the 1970s, arpa helped support the development of rules, or "protocols," for transferring data between different types of computer networks. These "internet" (from "internetworking") protocols made it possible to develop the worldwide Net we have today, which links all sorts of computers across national boundaries. By the close of the 1970s, links had been developed between arpanet and counterparts in other countries. The world was now tied together in a computer web.
In the 1980s, this network of networks, which became known collectively as the Internet, expanded at a phenomenal rate. Hundreds, then thousands, of colleges, research companies, and government agencies began to connect their computers to this worldwide Net. Some enterprising hobbyists and companies unwilling to pay the high costs of Internet access (or unable to meet stringent government regulations for access) learned how to link their own systems to the Internet, even if "only" for email and conferences. Some of these systems began offering access to the public. Now anybody with a computer and modem, persistence, and a small amount of money could tap into the world.
In the 1990s, the Net continues to grow at exponential rates. Some trend-watchers estimate that the volume of messages transferred through the Net grows 20 percent a month. In response, government and other users have tried in recent years to expand the Net itself. Once, the main Net "backbone" in the United States moved data at 56,000 bits per second. That proved too slow for the ever-increasing amounts of data being sent over it, and in recent years the maximum speed was increased to 1.5 million and then to 45 million bits per second. Even before the Net was able to reach that latter speed, however, Net experts were already figuring out ways to pump data at speeds of up to 2 billion bits per second--fast enough to send the entire Encyclopedia Britannica across the country in just one or two seconds. Another major change has been the development of commercial services that provide internetworking services at speeds comparable to those of the government system. In fact, what started as a government experiment is now largely a private enterprise.

How the Internet Works
The worldwide Net is actually a complex web of smaller regional networks. To understand the system, picture a modern network of transcontinental superhighways connecting large cities. From these large cities come smaller freeways and parkways that link small towns, whose residents travel on narrow residential roads.
The Net superhighway is the high-speed Internet. Connected to this are computers that use a particular system of transferring data at high speeds. In the United States, the major Internet computers theoretically can move data at rates of 45 million bits per second (compare this to the average home modem, which has a top speed of roughly 28,800 bits per second). Connected to the backbone computers are smaller networks serving particular geographical regions; these networks generally move data at speeds around 1.5 million bits per second. Feeding off these are even smaller networks or individual computers.
Unlike commercial networks (such as CompuServe or Prodigy), the Internet isn't run by a central computer or computers; its resources are to be found among thousands of individual computers. This is both its greatest strength and its greatest weakness. Because of this broad base, it's virtually impossible for the entire Net to crash at once; even if one computer shuts down, the rest of the network stays up. The design also reduces the cost for an individual or organization to get onto the network. However, thousands of connected computers can also make it difficult to navigate the Net and find what you want--especially since different computers may have different commands for plumbing their resources. It's only recently that Net users have begun to develop the sorts of navigational tools and "maps" that let neophytes get around without getting lost.
Protecting Yourself Online. Copyright © by Ric Eff. Reprinted by permission of HarperCollins Publishers, Inc. All rights reserved. Available now wherever books are sold.
Read More Show Less

Table of Contents

Ch. 1 Your Role on the Electronic Frontier: Determining the Future of the Internet 1
Ch. 2 Free Expression and Censorship Online: Reconciling Individual Liberties and Community Standards 19
Ch. 3 Privacy, Anonymity, and Secure Communications: Safeguarding Sensitive Personal and Business Data in the Information Age 35
Ch. 4 Copyrights, Licenses, Trademarks, and Patents: Protecting Intellectual Property Online 85
Ch. 5 The Code of Online Conduct? Learning Netiquette, Fighting Spam, Recognizing Spoof Email, Dealing with Hackers and Crackers, Treating Viruses, Spotting Scams, and Ensuring Equality 115
Ch. 6 Beyond the Frontier 169
Appendix 175
Contributors 189
Index 191
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 Customer Reviews
  • Anonymous

    Posted November 28, 2004

    I second that!

    I would have to aggree with Mark. This is another disappointing book that I paid for. It's very general and didn't go into the topics the way I had expected. It's a decent read, just be warned that you may not be impressed.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted June 8, 2000

    Not the best book on Internet safety

    I was disappointed when I got this book. I expected much more. I have read several books on Internet safety, etc. and find 'Life and Death on the Internet' by Keith A. Schroeder the best.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 2 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)