The dark side of the Internet: protecting yourself and your family from online criminals
Cyberterror and information warfare -- Cyberterror -- A digital Pearl Harbor? -- Information warfare -- Terrorist uses of technology -- Further information -- Cyberattacks -- Assessing the threat -- Safety and prevention -- Further information -- Malicious software -- Viruses, trojans, and worms --...
Main Author: | |
---|---|
Format: | Print Book |
Language: | English |
Published: |
Westport, Conn. [u.a.]
Praeger
2006
|
In: | Year: 2006 |
Edition: | 1. publ. |
Online Access: |
Inhaltsverzeichnis (Verlag) |
Availability in Tübingen: | Present in Tübingen. UB: KB 20 A 2313 |
Check availability: | HBZ Gateway |
Subito Delivery Service: | Order now. |
Keywords: |
MARC
LEADER | 00000cam a2200000 4500 | ||
---|---|---|---|
001 | 521331242 | ||
003 | DE-627 | ||
005 | 20220629105920.0 | ||
007 | tu | ||
008 | 061220s2006 xxu||||| 00| ||eng c | ||
010 | |a 2006026800 | ||
016 | 7 | |a 013702061 |2 UK | |
020 | |a 027598575X |c : alk. paper |9 0-275-98575-X | ||
024 | 8 | |a 2006026800 |q Identnummer | |
035 | |a (DE-627)521331242 | ||
035 | |a (DE-576)25893039X | ||
035 | |a (DE-599)GBV521331242 | ||
035 | |a (OCoLC)255244872 | ||
035 | |a (OCoLC)71288688 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
044 | |c XD-US |c XA-GB | ||
050 | 0 | |a HV6773 | |
082 | 0 | |a 005.8 |q LOC |2 22 | |
084 | |a 3,5 |2 ssgn | ||
084 | |a AP 18420 |2 rvk |0 (DE-625)rvk/7052: | ||
084 | |a PZ 3700 |2 rvk |0 (DE-625)rvk/141172: | ||
084 | |a 05.38 |2 bkl | ||
084 | |a 54.38 |2 bkl | ||
100 | 1 | |a Bocij, Paul |0 (DE-588)1095522671 |0 (DE-627)85614505X |0 (DE-576)463044959 |4 aut | |
109 | |a Bocij, Paul | ||
245 | 1 | 4 | |a The dark side of the Internet |b protecting yourself and your family from online criminals |c Paul Bocij |
250 | |a 1. publ. | ||
264 | 1 | |a Westport, Conn. [u.a.] |b Praeger |c 2006 | |
300 | |a XV, 253 S |c 24 cm | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Cyberterror and information warfare -- Cyberterror -- A digital Pearl Harbor? -- Information warfare -- Terrorist uses of technology -- Further information -- Cyberattacks -- Assessing the threat -- Safety and prevention -- Further information -- Malicious software -- Viruses, trojans, and worms -- Types of computer viruses -- How many viruses are there? -- The damage caused by viruses -- How viruses spread -- Who writes viruses? -- Why people write viruses -- Detecting viruses -- Dealing with viruses -- Choosing antivirus software -- Safety and prevention -- Virus hoaxes -- More about trojans -- Dealing with trojans -- Safety and prevention -- Further information -- Spyware and adware -- What is spyware? -- Adware -- Why create spyware? -- The extent of the problem -- Contracting spyware -- Dealing with spyware and adware -- Safety and prevention -- Further information -- Identity theft and fraud -- Identity theft -- What is identity theft? -- Identity theft and the internet -- The extent of the problem -- Identifying phishing e-mails -- Safety and prevention -- Further information -- E-mail fraud -- Advance fee frauds -- Foreign lotteries -- Nigerian 419 fraud -- Other e-mail frauds -- Safety and prevention -- Further information -- Auctions and other forms of fraud -- Auction fraud -- Safety and prevention -- Other online frauds -- Safety and prevention -- Further information -- Junk e-mail -- What is spam? -- The extent of the problem -- The cost of spam -- Why spam exists? -- Dealing with spam -- Safety and prevention -- Resources for dealing with spam -- Further information -- Intellectual property theft -- Software piracy -- Safety and prevention -- Music and movie piracy -- Further information -- Online relationships and deviance -- Cyberstalking -- What is cyberstalking? -- The extent of the problem -- Who are the cyberstalkers? -- Who is most at risk? -- New and emerging forms of cyberstalking -- Safety and prevention -- Further information -- Online relationships -- Social isolation -- White knights -- Hero syndrome -- Further information -- Deviant subcultures -- Cults and hate speech -- Deviant subcultures and addiction -- Safety and prevention -- Further information | ||
583 | 1 | |a Archivierung prüfen |c 20200919 |f DE-640 |z 1 |2 pdager | |
650 | 0 | |a Computer crimes | |
650 | 0 | |a Cyberterrorism | |
650 | 0 | |a Computer crimes | |
650 | 0 | |a Cyberterrorism | |
689 | 0 | 0 | |d s |0 (DE-588)4308416-3 |0 (DE-627)123816106 |0 (DE-576)211106267 |a Internet |2 gnd |
689 | 0 | 1 | |d s |0 (DE-588)4010452-7 |0 (DE-627)106357816 |0 (DE-576)208888128 |a Computerkriminalität |2 gnd |
689 | 0 | 2 | |d s |0 (DE-588)4076308-0 |0 (DE-627)104364106 |0 (DE-576)209201428 |a Prävention |2 gnd |
689 | 0 | |5 (DE-627) | |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz25893039Xinh.htm |m B:DE-576;DE-15 |q application/pdf |v 20140626115540 |x Verlag |3 Inhaltsverzeichnis |
935 | |i Blocktest | ||
936 | r | v | |a AP 18420 |b Internet |k Medien- und Kommunikationswissenschaften, Kommunikationsdesign |k Arten des Nachrichtenwesens, Medientechnik |k Internet |0 (DE-627)1311660909 |0 (DE-625)rvk/7052: |0 (DE-576)241660904 |
936 | r | v | |a PZ 3700 |b Datenschutz / Strafrecht, Computerkriminalität (BF Datenverarbeitung / Kriminalität) |k Datenverarbeitung und Recht |k Computerrecht, EDV-Recht, Recht des Internet |k Datenschutz / Strafrecht, Computerkriminalität (BF Datenverarbeitung / Kriminalität) |0 (DE-627)1271478900 |0 (DE-625)rvk/141172: |0 (DE-576)201478900 |
936 | b | k | |a 05.38 |j Neue elektronische Medien |x Kommunikationswissenschaft |0 (DE-627)106419579 |
936 | b | k | |a 54.38 |j Computersicherheit |0 (DE-627)106418866 |
951 | |a BO | ||
ELC | |b 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 3084712751 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 521331242 | ||
LOK | |0 005 20070125173131 | ||
LOK | |0 008 061114||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21 |c DE-627 |d DE-21 | ||
LOK | |0 852 |a DE-21 | ||
LOK | |0 852 1 |c KB 20 A 2313 |9 00 | ||
LOK | |0 935 |a krim | ||
LOK | |0 936ln |a k4.7.5 | ||
LOK | |0 938 |l 17/01/07 |8 6 | ||
ORI | |a SA-MARC-krimdoka001.raw | ||
SIG | |a UB: KB 20 A 2313 |