Language:
English
繁體中文
Help
Login
Back
to Search results for
[ subject:"Microcomputers." ]
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cyber spying = tracking your family's (sometimes) secret online lives /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Cyber spying/ Ted Fair ... [et al.].
Reminder of title:
tracking your family's (sometimes) secret online lives /
other author:
Fair, Ted.
Published:
Rockland, Mass. :Syngress, : c2005.,
Description:
xxiii, 439 p. :ill. ; : 24 cm.;
Notes:
Includes index.
Subject:
Internet - Censorship. -
Online resource:
An electronic book accessible through the World Wide Web; click for information
Online resource:
An electronic book accessible through the World Wide Web; click for information
ISBN:
9780080488653 (electronic bk.)
Cyber spying = tracking your family's (sometimes) secret online lives /
Cyber spying
tracking your family's (sometimes) secret online lives /[electronic resource] :Ted Fair ... [et al.]. - Rockland, Mass. :Syngress,c2005. - xxiii, 439 p. :ill. ;24 cm.
Includes index.
Why spy? -- Spying basics -- Technology overview : computer basics -- Network basics -- Taking control -- Spying on the PC -- Spying on Web browsing -- Spying on e-mail -- Spying on chat and instant messages -- Advanced techniques -- Counterspy : are you being watched?.
This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in. Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. *Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. *Targets a wide audience: personal computer users, specifically those interested in the online activities of their families.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 9780080488653 (electronic bk.)Subjects--Topical Terms:
574237
Internet
--Censorship.Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9.A25 / F34 2005eb
Dewey Class. No.: 004.678
Cyber spying = tracking your family's (sometimes) secret online lives /
LDR
:02799cam a22003014a 4500
001
613813
003
OCoLC
005
20091026094528.0
006
m d
007
cr cn
008
091218s2005 maua s 001 0 eng d
020
$a
9780080488653 (electronic bk.)
020
$a
008048865X (electronic bk.)
020
$a
9781931836418 (paper)
020
$a
1931836418 (paper)
035
$a
(OCoLC)162598789
035
$a
ocn162598789
040
$a
OPELS
$c
OPELS
$d
OKU
050
1 4
$a
QA76.9.A25
$b
F34 2005eb
082
0 4
$a
004.678
$2
22
245
0 0
$a
Cyber spying
$h
[electronic resource] :
$b
tracking your family's (sometimes) secret online lives /
$c
Ted Fair ... [et al.].
260
$a
Rockland, Mass. :
$c
c2005.
$b
Syngress,
300
$a
xxiii, 439 p. :
$b
ill. ;
$c
24 cm.
500
$a
Includes index.
505
0
$a
Why spy? -- Spying basics -- Technology overview : computer basics -- Network basics -- Taking control -- Spying on the PC -- Spying on Web browsing -- Spying on e-mail -- Spying on chat and instant messages -- Advanced techniques -- Counterspy : are you being watched?.
520
$a
This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in. Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. *Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. *Targets a wide audience: personal computer users, specifically those interested in the online activities of their families.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on Aug. 2, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Internet
$x
Censorship.
$3
574237
650
0
$a
Microcomputers
$x
Access control.
$3
641860
655
7
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Fair, Ted.
$3
641861
710
2
$a
ScienceDirect (Online service)
$3
636041
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781931836418
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781931836418
$z
An electronic book accessible through the World Wide Web; click for information
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login