The dark side of the Internet: protecting yourself and your family from online criminals

Cyberterror and information warfare -- Cyberterror -- A digital Pearl Harbor? -- Information warfare -- Terrorist uses of technology -- Further information -- Cyberattacks -- Assessing the threat -- Safety and prevention -- Further information -- Malicious software -- Viruses, trojans, and worms --...

Full description

Saved in:  
Bibliographic Details
Main Author: Bocij, Paul (Author)
Format: Print Book
Language:English
Published: Westport, Conn. [u.a.] Praeger 2006
In:Year: 2006
Edition:1. publ.
Online Access: Inhaltsverzeichnis (Verlag)
Availability in Tübingen:Present in Tübingen.
UB: KB 20 A 2313
Check availability: HBZ Gateway
Subito Delivery Service: Order now.
Keywords:

MARC

LEADER 00000cam a2200000 4500
001 521331242
003 DE-627
005 20220629105920.0
007 tu
008 061220s2006 xxu||||| 00| ||eng c
010 |a  2006026800 
016 7 |a 013702061  |2 UK 
020 |a 027598575X  |c  : alk. paper  |9 0-275-98575-X 
024 8 |a 2006026800  |q Identnummer 
035 |a (DE-627)521331242 
035 |a (DE-576)25893039X 
035 |a (DE-599)GBV521331242 
035 |a (OCoLC)255244872 
035 |a (OCoLC)71288688 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XD-US  |c XA-GB 
050 0 |a HV6773 
082 0 |a 005.8  |q LOC  |2 22 
084 |a 3,5  |2 ssgn 
084 |a AP 18420  |2 rvk  |0 (DE-625)rvk/7052: 
084 |a PZ 3700  |2 rvk  |0 (DE-625)rvk/141172: 
084 |a 05.38  |2 bkl 
084 |a 54.38  |2 bkl 
100 1 |a Bocij, Paul  |0 (DE-588)1095522671  |0 (DE-627)85614505X  |0 (DE-576)463044959  |4 aut 
109 |a Bocij, Paul 
245 1 4 |a The dark side of the Internet  |b protecting yourself and your family from online criminals  |c Paul Bocij 
250 |a 1. publ. 
264 1 |a Westport, Conn. [u.a.]  |b Praeger  |c 2006 
300 |a XV, 253 S  |c 24 cm 
336 |a Text  |b txt  |2 rdacontent 
337 |a ohne Hilfsmittel zu benutzen  |b n  |2 rdamedia 
338 |a Band  |b nc  |2 rdacarrier 
500 |a Includes bibliographical references and index 
520 |a Cyberterror and information warfare -- Cyberterror -- A digital Pearl Harbor? -- Information warfare -- Terrorist uses of technology -- Further information -- Cyberattacks -- Assessing the threat -- Safety and prevention -- Further information -- Malicious software -- Viruses, trojans, and worms -- Types of computer viruses -- How many viruses are there? -- The damage caused by viruses -- How viruses spread -- Who writes viruses? -- Why people write viruses -- Detecting viruses -- Dealing with viruses -- Choosing antivirus software -- Safety and prevention -- Virus hoaxes -- More about trojans -- Dealing with trojans -- Safety and prevention -- Further information -- Spyware and adware -- What is spyware? -- Adware -- Why create spyware? -- The extent of the problem -- Contracting spyware -- Dealing with spyware and adware -- Safety and prevention -- Further information -- Identity theft and fraud -- Identity theft -- What is identity theft? -- Identity theft and the internet -- The extent of the problem -- Identifying phishing e-mails -- Safety and prevention -- Further information -- E-mail fraud -- Advance fee frauds -- Foreign lotteries -- Nigerian 419 fraud -- Other e-mail frauds -- Safety and prevention -- Further information -- Auctions and other forms of fraud -- Auction fraud -- Safety and prevention -- Other online frauds -- Safety and prevention -- Further information -- Junk e-mail -- What is spam? -- The extent of the problem -- The cost of spam -- Why spam exists? -- Dealing with spam -- Safety and prevention -- Resources for dealing with spam -- Further information -- Intellectual property theft -- Software piracy -- Safety and prevention -- Music and movie piracy -- Further information -- Online relationships and deviance -- Cyberstalking -- What is cyberstalking? -- The extent of the problem -- Who are the cyberstalkers? -- Who is most at risk? -- New and emerging forms of cyberstalking -- Safety and prevention -- Further information -- Online relationships -- Social isolation -- White knights -- Hero syndrome -- Further information -- Deviant subcultures -- Cults and hate speech -- Deviant subcultures and addiction -- Safety and prevention -- Further information 
583 1 |a Archivierung prüfen  |c 20200919  |f DE-640  |z 1  |2 pdager 
650 0 |a Computer crimes 
650 0 |a Cyberterrorism 
650 0 |a Computer crimes 
650 0 |a Cyberterrorism 
689 0 0 |d s  |0 (DE-588)4308416-3  |0 (DE-627)123816106  |0 (DE-576)211106267  |a Internet  |2 gnd 
689 0 1 |d s  |0 (DE-588)4010452-7  |0 (DE-627)106357816  |0 (DE-576)208888128  |a Computerkriminalität  |2 gnd 
689 0 2 |d s  |0 (DE-588)4076308-0  |0 (DE-627)104364106  |0 (DE-576)209201428  |a Prävention  |2 gnd 
689 0 |5 (DE-627) 
856 4 2 |u https://swbplus.bsz-bw.de/bsz25893039Xinh.htm  |m B:DE-576;DE-15  |q application/pdf  |v 20140626115540  |x Verlag  |3 Inhaltsverzeichnis 
935 |i Blocktest 
936 r v |a AP 18420  |b Internet  |k Medien- und Kommunikationswissenschaften, Kommunikationsdesign  |k Arten des Nachrichtenwesens, Medientechnik  |k Internet  |0 (DE-627)1311660909  |0 (DE-625)rvk/7052:  |0 (DE-576)241660904 
936 r v |a PZ 3700  |b Datenschutz / Strafrecht, Computerkriminalität (BF Datenverarbeitung / Kriminalität)  |k Datenverarbeitung und Recht  |k Computerrecht, EDV-Recht, Recht des Internet  |k Datenschutz / Strafrecht, Computerkriminalität (BF Datenverarbeitung / Kriminalität)  |0 (DE-627)1271478900  |0 (DE-625)rvk/141172:  |0 (DE-576)201478900 
936 b k |a 05.38  |j Neue elektronische Medien  |x Kommunikationswissenschaft  |0 (DE-627)106419579 
936 b k |a 54.38  |j Computersicherheit  |0 (DE-627)106418866 
951 |a BO 
ELC |b 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 3084712751 
LOK |0 003 DE-627 
LOK |0 004 521331242 
LOK |0 005 20070125173131 
LOK |0 008 061114||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21  |c DE-627  |d DE-21 
LOK |0 852   |a DE-21 
LOK |0 852 1  |c KB 20 A 2313  |9 00 
LOK |0 935   |a krim 
LOK |0 936ln  |a k4.7.5 
LOK |0 938   |l 17/01/07  |8 6 
ORI |a SA-MARC-krimdoka001.raw 
SIG |a UB: KB 20 A 2313