Matches in Library of Congress for { <http://lccn.loc.gov/2006026800> ?p ?o. }
Showing items 1 to 22 of
22
with 100 items per page.
- 2006026800 contributor B10437664.
- 2006026800 created "2006.".
- 2006026800 date "2006".
- 2006026800 date "2006.".
- 2006026800 dateCopyrighted "2006.".
- 2006026800 description "Cyberterror and information warfare -- Cyberterror -- A digital Pearl Harbor? -- Information warfare -- Terrorist uses of technology -- Further information -- Cyberattacks -- Assessing the threat -- Safety and prevention -- Further information -- Malicious software -- Viruses, trojans, and worms -- Types of computer viruses -- How many viruses are there? -- The damage caused by viruses -- How viruses spread -- Who writes viruses? -- Why people write viruses -- Detecting viruses -- Dealing with viruses -- Choosing antivirus software -- Safety and prevention -- Virus hoaxes -- More about trojans -- Dealing with trojans -- Safety and prevention -- Further information -- Spyware and adware -- What is spyware? -- Adware -- Why create spyware? -- The extent of the problem -- Contracting spyware -- Dealing with spyware and adware -- Safety and prevention -- Further information -- Identity theft and fraud -- Identity theft -- What is identity theft? -- Identity theft and the internet -- The extent of the problem -- Identifying phishing e-mails -- Safety and prevention -- Further information -- E-mail fraud -- Advance fee frauds -- Foreign lotteries -- Nigerian 419 fraud -- Other e-mail frauds -- Safety and prevention -- Further information -- Auctions and other forms of fraud -- Auction fraud -- Safety and prevention -- Other online frauds -- Safety and prevention -- Further information -- Junk e-mail -- What is spam? -- The extent of the problem -- The cost of spam -- Why spam exists? -- Dealing with spam -- Safety and prevention -- Resources for dealing with spam -- Further information -- Intellectual property theft -- Software piracy -- Safety and prevention -- Music and movie piracy -- Further information -- Online relationships and deviance -- Cyberstalking -- What is cyberstalking? -- The extent of the problem -- Who are the cyberstalkers? -- Who is most at risk? -- New and emerging forms of cyberstalking -- Safety and prevention -- Further information -- Online relationships -- Social isolation -- White knights -- Hero syndrome -- Further information -- Deviant subcultures -- Cults and hate speech -- Deviant subcultures and addiction -- Safety and prevention -- Further information.".
- 2006026800 description "Includes bibliographical references (p. [231]-248) and index.".
- 2006026800 extent "xv, 253 p. :".
- 2006026800 identifier "027598575X (alk. paper)".
- 2006026800 identifier "9780275985752 (alk. paper)".
- 2006026800 identifier 2006026800.html.
- 2006026800 issued "2006".
- 2006026800 issued "2006.".
- 2006026800 language "eng".
- 2006026800 publisher "Westport, Conn. : Praeger,".
- 2006026800 subject "005.8 22".
- 2006026800 subject "Computer crimes.".
- 2006026800 subject "Cyberterrorism.".
- 2006026800 subject "HV6773 .B633 2006".
- 2006026800 tableOfContents "Cyberterror and information warfare -- Cyberterror -- A digital Pearl Harbor? -- Information warfare -- Terrorist uses of technology -- Further information -- Cyberattacks -- Assessing the threat -- Safety and prevention -- Further information -- Malicious software -- Viruses, trojans, and worms -- Types of computer viruses -- How many viruses are there? -- The damage caused by viruses -- How viruses spread -- Who writes viruses? -- Why people write viruses -- Detecting viruses -- Dealing with viruses -- Choosing antivirus software -- Safety and prevention -- Virus hoaxes -- More about trojans -- Dealing with trojans -- Safety and prevention -- Further information -- Spyware and adware -- What is spyware? -- Adware -- Why create spyware? -- The extent of the problem -- Contracting spyware -- Dealing with spyware and adware -- Safety and prevention -- Further information -- Identity theft and fraud -- Identity theft -- What is identity theft? -- Identity theft and the internet -- The extent of the problem -- Identifying phishing e-mails -- Safety and prevention -- Further information -- E-mail fraud -- Advance fee frauds -- Foreign lotteries -- Nigerian 419 fraud -- Other e-mail frauds -- Safety and prevention -- Further information -- Auctions and other forms of fraud -- Auction fraud -- Safety and prevention -- Other online frauds -- Safety and prevention -- Further information -- Junk e-mail -- What is spam? -- The extent of the problem -- The cost of spam -- Why spam exists? -- Dealing with spam -- Safety and prevention -- Resources for dealing with spam -- Further information -- Intellectual property theft -- Software piracy -- Safety and prevention -- Music and movie piracy -- Further information -- Online relationships and deviance -- Cyberstalking -- What is cyberstalking? -- The extent of the problem -- Who are the cyberstalkers? -- Who is most at risk? -- New and emerging forms of cyberstalking -- Safety and prevention -- Further information -- Online relationships -- Social isolation -- White knights -- Hero syndrome -- Further information -- Deviant subcultures -- Cults and hate speech -- Deviant subcultures and addiction -- Safety and prevention -- Further information.".
- 2006026800 title "The dark side of the Internet : protecting yourself and your family from online criminals / Paul Bocij.".
- 2006026800 type "text".