語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
The dark side of the Internet : = pr...
~
Bocij, Paul.
FindBook
Google Book
Amazon
博客來
The dark side of the Internet : = protecting yourself and your family from online criminals /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
The dark side of the Internet :/ Paul Bocij.
其他題名:
protecting yourself and your family from online criminals /
作者:
Bocij, Paul.
出版者:
Westport, Conn. :Praeger, : 2006.,
面頁冊數:
xv, 253 p. :ill ;25 cm.
內容註:
Cyberterror and information warfare -- Cyberterror -- A digital Pearl Harbor? -- Information warfare -- Terrorist uses of technology -- Further information -- Cyberattacks -- Assessing the threat -- Safety and prevention -- Further information -- Malicious software -- Viruses, trojans, and worms -- Types of computer viruses -- How many viruses are there? -- The damage caused by viruses -- How viruses spread -- Who writes viruses? -- Why people write viruses -- Detecting viruses -- Dealing with viruses -- Choosing antivirus software -- Safety and prevention -- Virus hoaxes -- More about trojans -- Dealing with trojans -- Safety and prevention -- Further information -- Spyware and adware -- What is spyware? -- Adware -- Why create spyware? -- The extent of the problem -- Contracting spyware -- Dealing with spyware and adware -- Safety and prevention -- Further information -- Identity theft and fraud -- Identity theft -- What is identity theft? -- Identity theft and the internet -- The extent of the problem -- Identifying phishing e-mails -- Safety and prevention -- Further information -- E-mail fraud -- Advance fee frauds -- Foreign lotteries -- Nigerian 419 fraud -- Other e-mail frauds -- Safety and prevention -- Further information -- Auctions and other forms of fraud -- Auction fraud -- Safety and prevention -- Other online frauds -- Safety and prevention -- Further information -- Junk e-mail -- What is spam? -- The extent of the problem -- The cost of spam -- Why spam exists? -- Dealing with spam -- Safety and prevention -- Resources for dealing with spam -- Further information -- Intellectual property theft -- Software piracy -- Safety and prevention -- Music and movie piracy -- Further information -- Online relationships and deviance -- Cyberstalking -- What is cyberstalking? -- The extent of the problem -- Who are the cyberstalkers? -- Who is most at risk? -- New and emerging forms of cyberstalking -- Safety and prevention -- Further information -- Online relationships -- Social isolation -- White knights -- Hero syndrome -- Further information -- Deviant subcultures -- Cults and hate speech -- Deviant subcultures and addiction -- Safety and prevention -- Further information.
標題:
Computer crimes. -
電子資源:
http://www.loc.gov/catdir/toc/ecip0620/2006026800.htmlhttp://www.loc.gov/catdir/toc/ecip0620/2006026800.html
ISBN:
027598575X (hbk.) :
The dark side of the Internet : = protecting yourself and your family from online criminals /
Bocij, Paul.
The dark side of the Internet :
protecting yourself and your family from online criminals /Paul Bocij. - Westport, Conn. :Praeger,2006. - xv, 253 p. :ill ;25 cm.
Includes bibliographical references and index.
Cyberterror and information warfare -- Cyberterror -- A digital Pearl Harbor? -- Information warfare -- Terrorist uses of technology -- Further information -- Cyberattacks -- Assessing the threat -- Safety and prevention -- Further information -- Malicious software -- Viruses, trojans, and worms -- Types of computer viruses -- How many viruses are there? -- The damage caused by viruses -- How viruses spread -- Who writes viruses? -- Why people write viruses -- Detecting viruses -- Dealing with viruses -- Choosing antivirus software -- Safety and prevention -- Virus hoaxes -- More about trojans -- Dealing with trojans -- Safety and prevention -- Further information -- Spyware and adware -- What is spyware? -- Adware -- Why create spyware? -- The extent of the problem -- Contracting spyware -- Dealing with spyware and adware -- Safety and prevention -- Further information -- Identity theft and fraud -- Identity theft -- What is identity theft? -- Identity theft and the internet -- The extent of the problem -- Identifying phishing e-mails -- Safety and prevention -- Further information -- E-mail fraud -- Advance fee frauds -- Foreign lotteries -- Nigerian 419 fraud -- Other e-mail frauds -- Safety and prevention -- Further information -- Auctions and other forms of fraud -- Auction fraud -- Safety and prevention -- Other online frauds -- Safety and prevention -- Further information -- Junk e-mail -- What is spam? -- The extent of the problem -- The cost of spam -- Why spam exists? -- Dealing with spam -- Safety and prevention -- Resources for dealing with spam -- Further information -- Intellectual property theft -- Software piracy -- Safety and prevention -- Music and movie piracy -- Further information -- Online relationships and deviance -- Cyberstalking -- What is cyberstalking? -- The extent of the problem -- Who are the cyberstalkers? -- Who is most at risk? -- New and emerging forms of cyberstalking -- Safety and prevention -- Further information -- Online relationships -- Social isolation -- White knights -- Hero syndrome -- Further information -- Deviant subcultures -- Cults and hate speech -- Deviant subcultures and addiction -- Safety and prevention -- Further information.
ISBN: 027598575X (hbk.) :UK44.95
LCCN: 2006026800Subjects--Topical Terms:
583792
Computer crimes.
LC Class. No.: HV6773 / .B633 2006
Dewey Class. No.: 005.8
The dark side of the Internet : = protecting yourself and your family from online criminals /
LDR
:02949pam a2200193 a 45
001
713735
005
20070627
008
070313s2006 ctu b 001 0 eng
010
$a
2006026800
020
$a
027598575X (hbk.) :
$c
UK44.95
035
$a
ED95T0094
040
$a
DLC
$c
DLC
$d
DLC
050
0 0
$a
HV6773
$b
.B633 2006
082
0 0
$a
005.8
$2
22
100
$a
Bocij, Paul.
$3
781845
245
1 4
$a
The dark side of the Internet :
$b
protecting yourself and your family from online criminals /
$c
Paul Bocij.
260
$a
Westport, Conn. :
$c
2006.
$b
Praeger,
300
$a
xv, 253 p. :
$b
ill ;
$c
25 cm.
504
$a
Includes bibliographical references and index.
505
0
$a
Cyberterror and information warfare -- Cyberterror -- A digital Pearl Harbor? -- Information warfare -- Terrorist uses of technology -- Further information -- Cyberattacks -- Assessing the threat -- Safety and prevention -- Further information -- Malicious software -- Viruses, trojans, and worms -- Types of computer viruses -- How many viruses are there? -- The damage caused by viruses -- How viruses spread -- Who writes viruses? -- Why people write viruses -- Detecting viruses -- Dealing with viruses -- Choosing antivirus software -- Safety and prevention -- Virus hoaxes -- More about trojans -- Dealing with trojans -- Safety and prevention -- Further information -- Spyware and adware -- What is spyware? -- Adware -- Why create spyware? -- The extent of the problem -- Contracting spyware -- Dealing with spyware and adware -- Safety and prevention -- Further information -- Identity theft and fraud -- Identity theft -- What is identity theft? -- Identity theft and the internet -- The extent of the problem -- Identifying phishing e-mails -- Safety and prevention -- Further information -- E-mail fraud -- Advance fee frauds -- Foreign lotteries -- Nigerian 419 fraud -- Other e-mail frauds -- Safety and prevention -- Further information -- Auctions and other forms of fraud -- Auction fraud -- Safety and prevention -- Other online frauds -- Safety and prevention -- Further information -- Junk e-mail -- What is spam? -- The extent of the problem -- The cost of spam -- Why spam exists? -- Dealing with spam -- Safety and prevention -- Resources for dealing with spam -- Further information -- Intellectual property theft -- Software piracy -- Safety and prevention -- Music and movie piracy -- Further information -- Online relationships and deviance -- Cyberstalking -- What is cyberstalking? -- The extent of the problem -- Who are the cyberstalkers? -- Who is most at risk? -- New and emerging forms of cyberstalking -- Safety and prevention -- Further information -- Online relationships -- Social isolation -- White knights -- Hero syndrome -- Further information -- Deviant subcultures -- Cults and hate speech -- Deviant subcultures and addiction -- Safety and prevention -- Further information.
650
$a
Computer crimes.
$3
583792
650
$a
Cyberterrorism.
$3
781846
856
4 1
$3
Table of contents only
$u
http://www.loc.gov/catdir/toc/ecip0620/2006026800.html
$z
http://www.loc.gov/catdir/toc/ecip0620/2006026800.html
筆 0 讀者評論
館藏地:
全部
六樓西文書區HC-Z(6F Western Language Books)
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W0055489
六樓西文書區HC-Z(6F Western Language Books)
01.外借(書)_YB
一般圖書
HV6773 B633 2006
一般使用(Normal)
在架
0
預約
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入