語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber spying = tracking your family's (sometimes) secret online lives /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cyber spying/ Ted Fair ... [et al.].
其他題名:
tracking your family's (sometimes) secret online lives /
其他作者:
Fair, Ted.
出版者:
Rockland, Mass. :Syngress, : c2005.,
面頁冊數:
xxiii, 439 p. :ill. ; : 24 cm.;
附註:
Includes index.
標題:
Internet - Censorship. -
電子資源:
An electronic book accessible through the World Wide Web; click for information
電子資源:
An electronic book accessible through the World Wide Web; click for information
ISBN:
9780080488653 (electronic bk.)
Cyber spying = tracking your family's (sometimes) secret online lives /
Cyber spying
tracking your family's (sometimes) secret online lives /[electronic resource] :Ted Fair ... [et al.]. - Rockland, Mass. :Syngress,c2005. - xxiii, 439 p. :ill. ;24 cm.
Includes index.
Why spy? -- Spying basics -- Technology overview : computer basics -- Network basics -- Taking control -- Spying on the PC -- Spying on Web browsing -- Spying on e-mail -- Spying on chat and instant messages -- Advanced techniques -- Counterspy : are you being watched?.
This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in. Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. *Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. *Targets a wide audience: personal computer users, specifically those interested in the online activities of their families.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 9780080488653 (electronic bk.)Subjects--Topical Terms:
574237
Internet
--Censorship.Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9.A25 / F34 2005eb
Dewey Class. No.: 004.678
Cyber spying = tracking your family's (sometimes) secret online lives /
LDR
:02799cam a22003014a 4500
001
613813
003
OCoLC
005
20091026094528.0
006
m d
007
cr cn
008
091218s2005 maua s 001 0 eng d
020
$a
9780080488653 (electronic bk.)
020
$a
008048865X (electronic bk.)
020
$a
9781931836418 (paper)
020
$a
1931836418 (paper)
035
$a
(OCoLC)162598789
035
$a
ocn162598789
040
$a
OPELS
$c
OPELS
$d
OKU
050
1 4
$a
QA76.9.A25
$b
F34 2005eb
082
0 4
$a
004.678
$2
22
245
0 0
$a
Cyber spying
$h
[electronic resource] :
$b
tracking your family's (sometimes) secret online lives /
$c
Ted Fair ... [et al.].
260
$a
Rockland, Mass. :
$c
c2005.
$b
Syngress,
300
$a
xxiii, 439 p. :
$b
ill. ;
$c
24 cm.
500
$a
Includes index.
505
0
$a
Why spy? -- Spying basics -- Technology overview : computer basics -- Network basics -- Taking control -- Spying on the PC -- Spying on Web browsing -- Spying on e-mail -- Spying on chat and instant messages -- Advanced techniques -- Counterspy : are you being watched?.
520
$a
This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in. Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. *Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. *Targets a wide audience: personal computer users, specifically those interested in the online activities of their families.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on Aug. 2, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Internet
$x
Censorship.
$3
574237
650
0
$a
Microcomputers
$x
Access control.
$3
641860
655
7
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Fair, Ted.
$3
641861
710
2
$a
ScienceDirect (Online service)
$3
636041
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781931836418
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781931836418
$z
An electronic book accessible through the World Wide Web; click for information
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入