|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocm73814269 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
061020s2006 inua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d UMI
|d TXJ
|d CEF
|d C6I
|d OCLCQ
|d TEFOD
|d IDEBK
|d DEBSZ
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d TEFOD
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d WY@
|d OCLCA
|d OCLCQ
|d AU@
|d STF
|d OCLCQ
|d RDF
|d VT2
|d OCLCO
|d OCL
|d OCLCO
|
019 |
|
|
|a 173973069
|a 744983607
|a 1152980187
|
020 |
|
|
|a 0789735539
|
020 |
|
|
|a 9780789735539
|
020 |
|
|
|a 0768667224
|q (electronic bk. ;
|q Adobe Reader)
|
020 |
|
|
|a 9780768667226
|q (electronic bk. ;
|q Adobe Reader)
|
029 |
1 |
|
|a CHBIS
|b 006149697
|
029 |
1 |
|
|a CHVBK
|b 171352238
|
029 |
1 |
|
|a DEBSZ
|b 355383640
|
029 |
1 |
|
|a GBVCP
|b 668810629
|
029 |
1 |
|
|a HEBIS
|b 291457088
|
029 |
1 |
|
|a AU@
|b 000067097483
|
035 |
|
|
|a (OCoLC)73814269
|z (OCoLC)173973069
|z (OCoLC)744983607
|z (OCoLC)1152980187
|
037 |
|
|
|a CL0500000006
|b Safari Books Online
|
037 |
|
|
|a 1E39092C-F7EC-4525-946F-92A23E2CFA8B
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a HV6673
|b .G73 2006
|
072 |
|
7 |
|a UTN, UXAS
|2 bicssc
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Gralla, Preston.
|
245 |
1 |
0 |
|a How personal & Internet security works /
|c Preston Gralla.
|
260 |
|
|
|a [Indianapolis, Ind.] :
|b Que Pub.,
|c 2006.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a How the Internet works -- How hackers break into your PC and how to protect against them -- How spyware and anti-spyware work -- How websites invade your privacy -- The dangers of Internet search -- How "phishing" attacks can steal your identity and how to protect against them -- How Zombies and Trojan Horses attack you and how to protect against them -- The security dangers in Browsers -- How Worms and Viruses do their damage and how to protect against them -- Wi-Fi security dangers and protections -- Bluetooth security dangers -- How Instant Messaging pests work -- How Spam works and how to fight it -- How Denial-of-Service attacks bring down websites -- How virtual private networks and encryption keep you safe -- How Web blocking and parental controls work -- How personal Firewalls and Proxy Servers protect you -- How Identity Theft works -- Credit card security -- The Dangers of Data Mining -- The Dangers of workplace surveillance -- How cell phones can be hacked -- How Biometrics works -- How Radio Frequency ID can invade your privacy -- How location tracking works -- How DNA matching works -- How airport scanners and screening systems work -- The Federal government, privacy, and electronic surveillance -- How wiretapping and lie detectors work.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
0 |
|a Internet fraud.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
0 |
|a Computer fraud.
|
650 |
|
6 |
|a Criminalité informatique.
|
650 |
|
6 |
|a Fraude informatique.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer crimes.
|2 blmlsh
|
650 |
|
7 |
|a Internet fraud.
|2 blmlsh
|
650 |
|
7 |
|a Computer security.
|2 blmlsh
|
650 |
|
7 |
|a Internet
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer fraud
|2 fast
|
650 |
|
7 |
|a Computer crimes
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Internet fraud
|2 fast
|
650 |
|
7 |
|a Internet
|x Security measures
|2 fast
|
650 |
|
7 |
|a Social Welfare & Social Work.
|2 hilcc
|
650 |
|
7 |
|a Engineering & Applied Sciences.
|2 hilcc
|
650 |
|
7 |
|a Social Sciences.
|2 hilcc
|
650 |
|
7 |
|a Criminology, Penology & Juvenile Delinquency.
|2 hilcc
|
650 |
|
7 |
|a Computer Science.
|2 hilcc
|
655 |
|
4 |
|a Electronic resource.
|
776 |
0 |
8 |
|i Print version:
|a Gralla, Preston.
|t How personal & Internet security works.
|d [Indianapolis, Ind.] : Que Pub., 2006
|z 9780789735539
|w (DLC) 2006922248
|w (OCoLC)68262415
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0789735539/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 84880
|
994 |
|
|
|a 92
|b IZTAP
|