Cyber spying: tracking your family's (sometimes) secret online lives
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
©2005
|
Schlagwörter: | |
Links: | http://www.sciencedirect.com/science/book/9781931836418 http://www.sciencedirect.com/science/book/9781931836418 |
Beschreibung: | Includes bibliographical references and index This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in. Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. *Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. *Targets a wide audience: personal computer users, specifically those interested in the online activities of their families |
Umfang: | 1 Online-Ressource (xxiii, 439 pages) |
ISBN: | 008048865X 1597490253 1931836418 9780080488653 9781597490252 9781931836418 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV042307407 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2005 xx o|||| 00||| eng d | ||
020 | |a 008048865X |c electronic bk. |9 0-08-048865-X | ||
020 | |a 1597490253 |c electronic bk. : Adobe Reader |9 1-59749-025-3 | ||
020 | |a 1931836418 |9 1-931836-41-8 | ||
020 | |a 9780080488653 |c electronic bk. |9 978-0-08-048865-3 | ||
020 | |a 9781597490252 |c electronic bk. : Adobe Reader |9 978-1-59749-025-2 | ||
020 | |a 9781931836418 |9 978-1-931836-41-8 | ||
035 | |a (OCoLC)70742808 | ||
035 | |a (DE-599)BVBBV042307407 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 004.678 |2 22 | |
100 | 1 | |a Fair, Ted |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber spying |b tracking your family's (sometimes) secret online lives |c Ted Fair, Michael Nordfelt, Sandra Ring, Eric Cole, technical editor |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c ©2005 | |
300 | |a 1 Online-Ressource (xxiii, 439 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in. Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. *Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. *Targets a wide audience: personal computer users, specifically those interested in the online activities of their families | ||
650 | 4 | |a Microcomputers / Access control | |
650 | 4 | |a Cyberspace | |
650 | 4 | |a Internet | |
650 | 4 | |a Espionage | |
650 | 4 | |a Computer security | |
650 | 4 | |a Internet | |
700 | 1 | |a Nordfelt, Michael |e Sonstige |4 oth | |
700 | 1 | |a Ring, Sandra |e Sonstige |4 oth | |
700 | 1 | |a Cole, Eric |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781931836418 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD | ||
940 | 1 | |q FLA_PDA_ESD | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027744399 | |
966 | e | |u http://www.sciencedirect.com/science/book/9781931836418 |l DE-1046 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818979937399341056 |
---|---|
any_adam_object | |
author | Fair, Ted |
author_facet | Fair, Ted |
author_role | aut |
author_sort | Fair, Ted |
author_variant | t f tf |
building | Verbundindex |
bvnumber | BV042307407 |
collection | ZDB-33-ESD |
ctrlnum | (OCoLC)70742808 (DE-599)BVBBV042307407 |
dewey-full | 004.678 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.678 |
dewey-search | 004.678 |
dewey-sort | 14.678 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02921nam a2200505zc 4500</leader><controlfield tag="001">BV042307407</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2005 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008048865X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-048865-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490253</subfield><subfield code="c">electronic bk. : Adobe Reader</subfield><subfield code="9">1-59749-025-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836418</subfield><subfield code="9">1-931836-41-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080488653</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-048865-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490252</subfield><subfield code="c">electronic bk. : Adobe Reader</subfield><subfield code="9">978-1-59749-025-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836418</subfield><subfield code="9">978-1-931836-41-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)70742808</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042307407</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.678</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Fair, Ted</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber spying</subfield><subfield code="b">tracking your family's (sometimes) secret online lives</subfield><subfield code="c">Ted Fair, Michael Nordfelt, Sandra Ring, Eric Cole, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">©2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxiii, 439 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in. Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. *Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. *Targets a wide audience: personal computer users, specifically those interested in the online activities of their families</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microcomputers / Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Espionage</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nordfelt, Michael</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ring, Sandra</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cole, Eric</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781931836418</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027744399</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781931836418</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042307407 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T17:07:28Z |
institution | BVB |
isbn | 008048865X 1597490253 1931836418 9780080488653 9781597490252 9781931836418 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027744399 |
oclc_num | 70742808 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xxiii, 439 pages) |
psigel | ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Fair, Ted Verfasser aut Cyber spying tracking your family's (sometimes) secret online lives Ted Fair, Michael Nordfelt, Sandra Ring, Eric Cole, technical editor Rockland, MA Syngress Pub. ©2005 1 Online-Ressource (xxiii, 439 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in. Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. *Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. *Targets a wide audience: personal computer users, specifically those interested in the online activities of their families Microcomputers / Access control Cyberspace Internet Espionage Computer security Nordfelt, Michael Sonstige oth Ring, Sandra Sonstige oth Cole, Eric Sonstige oth http://www.sciencedirect.com/science/book/9781931836418 Verlag Volltext |
spellingShingle | Fair, Ted Cyber spying tracking your family's (sometimes) secret online lives Microcomputers / Access control Cyberspace Internet Espionage Computer security |
title | Cyber spying tracking your family's (sometimes) secret online lives |
title_auth | Cyber spying tracking your family's (sometimes) secret online lives |
title_exact_search | Cyber spying tracking your family's (sometimes) secret online lives |
title_full | Cyber spying tracking your family's (sometimes) secret online lives Ted Fair, Michael Nordfelt, Sandra Ring, Eric Cole, technical editor |
title_fullStr | Cyber spying tracking your family's (sometimes) secret online lives Ted Fair, Michael Nordfelt, Sandra Ring, Eric Cole, technical editor |
title_full_unstemmed | Cyber spying tracking your family's (sometimes) secret online lives Ted Fair, Michael Nordfelt, Sandra Ring, Eric Cole, technical editor |
title_short | Cyber spying |
title_sort | cyber spying tracking your family s sometimes secret online lives |
title_sub | tracking your family's (sometimes) secret online lives |
topic | Microcomputers / Access control Cyberspace Internet Espionage Computer security |
topic_facet | Microcomputers / Access control Cyberspace Internet Espionage Computer security |
url | http://www.sciencedirect.com/science/book/9781931836418 |
work_keys_str_mv | AT fairted cyberspyingtrackingyourfamilyssometimessecretonlinelives AT nordfeltmichael cyberspyingtrackingyourfamilyssometimessecretonlinelives AT ringsandra cyberspyingtrackingyourfamilyssometimessecretonlinelives AT coleeric cyberspyingtrackingyourfamilyssometimessecretonlinelives |