Web Security, Privacy and Commerce, 2nd Edition
| only for RuBoard - do not distribute or recompile |
8.6 Conclusion
In this chapter, we explored a number of techniques and technologies that have been developed for tracking users on the Internet. In the next chapter, we will examine techniques that you can use for protecting your privacy. Then in Chapter 10, we'll look at technologies you can use for fighting back.
| only for RuBoard - do not distribute or recompile |