Part 4: Protection Yourself

Part 4: Protection Yourself

Chapter 14: Computing on a Shoestring
Chapter 15: Protecting Your Data and Your Privacy
Chapter 16: Waging War on Spam
Chapter 17: Web Bugs, Adware, Pop-Ups, and Spyware