The Locator -- [(title = "voice over ")]

138 records matched your query       


Record 54 | Previous Record | Long Display | Next Record
08192cam a22004454a 4500
001 2986A33A2B0D11DE82774608A8D7520A
003 SILO
005 20090730151221
008 060224s2006    maua     b    001 0 eng  
010    $a 2006006796
020    $a 9781584504863 (pbk. with cd-rom : alk. paper)
020    $a 1584504862 (pbk. with cd-rom : alk. paper)
040    $a DLC $c DLC $d SILO $d C#P $d BTCTA $d YDXCP $d CS1 $d LMR $d CRH $d TBS $d NOR $d IOG $d SILO
042    $a pcc
050 00 $a QA76.9.A25 $b B37734 2006
082 00 $a 005.8 $2 22
100 1  $a Barile, Ian.
245 1  $a Protecting your PC / $c Ian Barile.
250    $a 1st ed.
260    $a Boston, Mass. : $b Charles River Meida, $c 2006.
300    $a xix, 364 p. : $b ill. ; $c 24 cm. $e + 1 CD-ROM (4 3/4 in.)
440  0 $a Charles River Media general computing series
504    $a Includes bibliographical references and index.
505 00 $t Summary -- $g 2. $t Getting started -- $g 1. The $t what's and why's of computer security? -- $t Computer security -- $t How do you make computers secure? -- $t Why do you need to protect your computer? -- $t What are you protecting yourself against? -- $t What happens when you don't protect your computer -- $t Summary -- $g 2. $t Where are you at? -- $t Your level of experience -- $t How do you use your computer? -- $t How secure are you? -- $t Summary --
505 00 $g The $t Summary -- $g 3. $t Viruses, worms, and Trojans -- $t What is a computer virus? -- $t Worms -- $t Trojans -- $t Other categories of malicious code -- $t How do you get infected? -- $t Are you infected? -- $t Is your email infected with a virus? -- $t Antibiotics and vaccines for computers -- $t Where antivirus software doesn't protect you -- $t Hoaxes, the joke is on you -- $t Additional information -- $t Summary -- $g 4. $t Stopping those pesky pop-ups, putting an end to spyware -- $g A $t run in with adware and spyware -- $t Why it's good to be in the "know" -- $t Where is that pop-up ad coming from? -- $t Spyware, is someone watching me? -- $t Adware, spyware, and Internet Explorer -- $t Other nasty applications -- $t How did the adware and spyware get on my computer? -- $g The $t effects of adware and spyware -- $t Are you being spied on? -- $t Additional information -- $t Summary --
505 00 $g 7. $t Summary -- $g 5. $t Getting to the Internet, Internet service providers (ISPs) -- $t What type of connection is right for you? -- $t How computers talk with one another -- $t ISPs and your privacy -- $t Finding the right ISP -- $t What do the numbers mean? -- $t Additional information -- $t Summary -- $g 6. $t Stopping the hacker onslaught -- $t What is a firewall? -- $t Is your computer a honey pot? -- $t Why you should use a hardware firewall -- $t Hardware firewalls -- $t Choosing a broadband router -- $t Why use a personal firewall? -- $t Where do you get a personal firewall? -- $t Security features of Norton Internet security personal firewall -- $t Windows firewall for Windows XP Service Pack 2 -- $t Security scans -- $t Testing your firewall for leaks -- $t Summary -- $g 7. $t Going wireless -- $t Wireless LANs -- $t Making sense of 802.11 protocols -- $t Planning on going wireless? -- $t You've already gone wireless -- $t It's important to secure that wireless LAN -- $t Securing your wireless router -- $t Bluetooth -- $t Additional information -- $t Summary --
505 00 $g 12. $t Summary -- $g 8. $t Untangling the Web -- $t Web browsers -- $g The $t Web at work -- $t Secure connections -- $t How does that web server know who I am? -- $t Good tools that go bad -- $t Web anonymizers -- $t Browser security tests -- $t Summary -- $g 9. $t Locking down Internet Explorer -- $t Patch Internet Explorer -- $t Finding the security options -- $t Cleaning temporary files and history -- $t Security zones -- $t Cookies -- $t Trusted publishers -- $t Internet Explorer's secure connection settings -- $t Advanced options -- $t Windows XP Service Pack 2 for Internet Explorer -- $t Summary -- $g 10. Shopping and banking online -- $t It is safe to bank online -- $t Trading online -- $t Paying bills online -- $t Bill management -- $t Online shopping -- $t Online auctions -- $t Taxes -- $t Fraud -- $t Summary -- $g 11. $t E-mail, how private is it? -- $t Who owns your email? -- $t Email and the government -- $t Personal email accounts -- $t Signing up for a personal account -- $t Company email accounts -- $t I didn't want that in my inbox -- $t Email and your electronic mailman -- $t Intercepting email -- $t Carnivore -- $t Securing your email -- $t Digital signatures -- $t Summary -- $g 12. $t Spam, it's not canned ham -- $t Why span is bad -- $t Why spammers spam -- $t History of spam -- $t Different types of spam -- $t Opting out of spam ; it doesn't work -- $t Laws of spam -- $t Fighting spam -- $t How spammers find you -- $t How antispam tools work -- $t Norton antispam -- $t Summary --
505 00 $g 15. The $t Summary -- $t Phishing emails are a regular occurrence -- $t What type of information are phishers phishing for? -- $t Types of phishing emails -- $t Is that email legit? -- $t Cross-site scripting -- $t Phishing and blogs -- $t Phishing, voice over IP and faking caller ID -- $t Who runs phishing scams? -- $t Pharming -- $t Spam filters and phishing -- $t Phishing and security suites -- $t Additional information -- $t Summary -- $g 14. $t Securing your email client -- $t Why you want to secure your email client -- $t Types of email clients -- $t Application email clients -- $t Web based email clients -- $t Tools that protect email clients -- $t Summary -- $g 15. The $t do's and don'ts of instant messaging and chat rooms -- $t What is instant messaging? -- $t Why instant message? -- $t Choosing an instant messaging service -- $t Protecting yourself when you're instant messaging -- $t What are chat rooms? -- $t Where to chat? -- $t Chatting safely -- $t Is your favorite chat service a safe place to chat? -- $t Chatting tips for kids -- $t Summary --
505 00 $g The $t Summary -- $g 16. $t Filing the holes, system and application patching -- $t Software and bugs -- $t Vulnerabilities -- $t End user license agreements (EULA) -- $t You need to fix recalled software, apply the update -- $t Microsoft and security vulnerabilities -- $t Updating Windows -- $t Updating Microsoft Office -- $t Update your antivirus software's virus definitions -- $t Update your personal firewall -- $t Update your instant messaging software -- $t Update the BIOS -- $t Update device drivers -- $t Summary -- $g 17. $t Saving yourself from the delete key -- $t Deleting a file -- $t What happens when a file is deleted -- $g The $t importance of backing up files -- $t Backup strategies -- $t Making sure the delete key deletes the file -- $t Summary --
505 00 $g 20. $t Index. $g 18. $t Passwords -- $t Identification, authentication, authorization, and access control -- $t Why you need to choose a good password -- $t Choosing a good password -- $g The $t security of a sticky note -- $t When and how passwords fail -- $g The $t importance of changing your password -- $t Reusing passwords is a bad idea -- $t Universal passwords -- $t Software that fills in passwords on Web form -- $t Authentication systems -- $t Summary -- $g 19. $t Protecting your privacy, personal and confidential information -- $t Your privacy -- $t Personal and confidential information -- $t Summary -- $g 20. $t Kids, computers, and the Internet -- $t Kids and computers -- $t Make using a computer a family experience -- $t Leaving the house through the Internet -- $t Is your child at risk? -- $t Rules for computer safety -- $t Laws that protect children -- $t Parental control software -- $t Summary -- $t Appendix A : Web resources -- $t General computer news -- $t Windows security -- $t Computer viruses -- $t General computer security -- $t Browser security -- $t Identity theft -- $t Spam -- $t Phishing -- $t Updating the Windows operation system -- $t Appendix B : Security checklists -- $t Appendix C : The law, computers, and you -- $t Copyrights -- $t Hacking and tampering -- $t Privacy -- $t Additional information -- $t Appendix D :  About the CD-ROM -- $t Index.
650  0 $a Computer security.
650  0 $a Computer networks $x Security measures.
856 41 $3 Table of contents only $u http://www.loc.gov/catdir/toc/ecip069/2006006796.html
941    $a 4
952    $l PYAX423 $d 20180718043251.0
952    $l GDPF771 $d 20170418053731.0
952    $l UNUX074 $d 20090701080000.0
952    $l OIAX792 $d 20090708133753.0
956    $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=2986A33A2B0D11DE82774608A8D7520A
994    $a 02 $b IOG

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.