Cover; Contents; Preface; Acknowledgments; Introduction; 1: Your Right to Privacy; 2: Computer Viruses: Invisible Threats to Privacy; 3: Spyware: Software Snooping on Your Private Data; 4: Phishing and Social Engineering: Confidence Games Go Online; 5: Your Personal Information Online: Everyone is a Public Figure Now; 6: Identity Theft: Protecting Oneself Against Inposters; 7: Keeping Your Data Secure the Best Offense is a Good Defense; 8: Databases, Privacy, and Security: Monitoring the Online You; Chronology; Glossary; Further Resources; Index