| 000 | 05399cam a2200793 a 4500 | ||
|---|---|---|---|
| 001 | ocm70742808 | ||
| 003 | OCoLC | ||
| 005 | 20240829154227.0 | ||
| 006 | m d | ||
| 007 | cr cn||||||||| | ||
| 008 | 040920s2005 maua ob 001 0 eng d | ||
| 040 |
_aREDDC _beng _epn _cREDDC _dBAKER _dOCLCQ _dEBLCP _dYDXCP _dN$T _dIDEBK _dOCLCQ _dDKDLA _dMERUC _dCCO _dE7B _dOCLCQ _dOCLCO _dOCLCQ _dOPELS _dOKU _dFVL _dCSU _dUMI _dDEBSZ _dOCLCQ _dOCLCF _dOCLCQ _dON8 _dTEFOD _dOCLCQ _dCOO _dOCLCQ _dAZK _dAGLDB _dCOCUF _dCNNOR _dMOR _dPIFBR _dOCLCQ _dU3W _dOCLCA _dSTF _dBRL _dWRM _dD6H _dVTS _dCEF _dNRAMU _dNLE _dINT _dVT2 _dOCLCQ _dUKMGB _dA6Q _dOCLCQ _dUAB _dLEAUB _dOCLCQ _dK6U _dVLY _dUKCRE _dOCLCO _dINARC _dOCLCQ _dCOA _dOCLCO |
||
| 016 | 7 |
_a017581773 _2Uk |
|
| 019 |
_a61720663 _a122378093 _a162598789 _a475380966 _a559352276 _a646729135 _a663882776 _a722339269 _a728024916 _a824151185 _a888741323 _a961652174 _a962688852 _a988417430 _a991909635 _a1035657923 _a1037488435 _a1038614828 _a1045512201 _a1055367386 _a1076321137 _a1081218974 _a1103255966 _a1129335708 _a1153037231 _a1162546810 _a1192329633 _a1228527483 _a1240527227 _a1340080247 |
||
| 020 |
_a1597490253 _q(electronic bk.) |
||
| 020 |
_a9781597490252 _q(electronic bk.) |
||
| 020 |
_a9780080488653 _q(electronic bk.) |
||
| 020 |
_a008048865X _q(electronic bk.) |
||
| 020 | _a1281035815 | ||
| 020 | _a9781281035813 | ||
| 020 | _a9786611035815 | ||
| 020 | _a6611035818 | ||
| 020 | _z1931836418 | ||
| 020 | _z9781931836418 | ||
| 024 | 4 | _z9781931836418 | |
| 024 | 8 | _a(WaSeSS)ssj0000278444 | |
| 035 |
_a249360 _b(N$T) |
||
| 035 |
_a(OCoLC)70742808 _z(OCoLC)61720663 _z(OCoLC)122378093 _z(OCoLC)162598789 _z(OCoLC)475380966 _z(OCoLC)559352276 _z(OCoLC)646729135 _z(OCoLC)663882776 _z(OCoLC)722339269 _z(OCoLC)728024916 _z(OCoLC)824151185 _z(OCoLC)888741323 _z(OCoLC)961652174 _z(OCoLC)962688852 _z(OCoLC)988417430 _z(OCoLC)991909635 _z(OCoLC)1035657923 _z(OCoLC)1037488435 _z(OCoLC)1038614828 _z(OCoLC)1045512201 _z(OCoLC)1055367386 _z(OCoLC)1076321137 _z(OCoLC)1081218974 _z(OCoLC)1103255966 _z(OCoLC)1129335708 _z(OCoLC)1153037231 _z(OCoLC)1162546810 _z(OCoLC)1192329633 _z(OCoLC)1228527483 _z(OCoLC)1240527227 _z(OCoLC)1340080247 |
||
| 037 |
_a2B299728-F709-4380-A203-FC267F1DCD66 _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
| 050 | 4 |
_aQA76.9.A25 _bF35 2005eb |
|
| 082 | 0 | 4 |
_a004.678 _222 |
| 049 | _aMAIN | ||
| 100 | 1 |
_aFair, Ted. _999363 |
|
| 245 | 1 | 0 |
_aCyber spying : _btracking your family's (sometimes) secret online lives / _cTed Fair, Michael Nordfelt, Sandra Ring, Eric Cole, technical editor. |
| 260 |
_aRockland, MA : _bSyngress Pub., _c©2005. |
||
| 300 |
_a1 online resource (xxiii, 439 pages) : _billustrations |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 | _adata file | ||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aWhy spy? -- Spying basics -- Technology overview : computer basics -- Network basics -- Taking control -- Spying on the PC -- Spying on Web browsing -- Spying on e-mail -- Spying on chat and instant messages -- Advanced techniques -- Counterspy : are you being watched? | |
| 588 | 0 | _aPrint version record. | |
| 520 | _aThis book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in. Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. *Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. *Targets a wide audience: personal computer users, specifically those interested in the online activities of their families. | ||
| 546 | _aEnglish. | ||
| 590 | _aAdded to collection customer.56279.3 | ||
| 650 | 0 |
_aComputer security. _92191 |
|
| 650 | 0 |
_aInternet. _91383 |
|
| 650 | 2 |
_aComputer Security _92191 |
|
| 650 | 2 |
_aInternet _91383 |
|
| 650 | 6 |
_aSécurité informatique. _918600 |
|
| 650 | 6 |
_aInternet. _91383 |
|
| 650 | 7 |
_aInternet. _2aat _91383 |
|
| 650 | 7 |
_aComputer security _2fast _92191 |
|
| 650 | 7 |
_aInternet _2fast _91383 |
|
| 700 | 1 |
_aNordfelt, Michael. _999364 |
|
| 700 | 1 |
_aRing, Sandra. _999048 |
|
| 700 | 1 |
_aCole, Eric. _999043 |
|
| 776 | 0 | 8 |
_iPrint version: _aFair, Ted. _tCyber spying. _dRockland, MA : Syngress Pub., ©2005 _z9781931836418 _w(OCoLC)57354576 |
| 856 | 4 | 0 |
_3EBSCOhost _uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=249360 |
| 936 | _aBATCHLOAD | ||
| 938 |
_aBaker & Taylor _bBKTY _c39.95 _d29.96 _i1931836418 _n0006210547 _sactive |
||
| 938 |
_aebrary _bEBRY _nebr10074965 |
||
| 938 |
_aEBSCOhost _bEBSC _n249360 |
||
| 938 |
_aInternet Archive _bINAR _ncyberspyingtrack0000fair |
||
| 938 |
_aYBP Library Services _bYANK _n2627179 |
||
| 938 |
_aYBP Library Services _bYANK _n2730612 |
||
| 994 |
_a92 _bN$T |
||
| 999 |
_c684833 _d684833 |
||