Cyber spying: tracking your family's (sometimes) secret online lives
This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | , , |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
2005
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781931836418/?ar |
Zusammenfassung: | This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in. Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. *Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. *Targets a wide audience: personal computer users, specifically those interested in the online activities of their families. |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (xxiii, 439 Seiten) illustrations |
ISBN: | 1597490253 9781597490252 9780080488653 008048865X 1281035815 9781281035813 9786611035815 6611035818 9781931836418 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047755857 | ||
003 | DE-627-1 | ||
005 | 20240228114029.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2005 xx |||||o 00| ||eng c | ||
020 | |a 1597490253 |c electronic bk. |9 1-59749-025-3 | ||
020 | |a 9781597490252 |c electronic bk. |9 978-1-59749-025-2 | ||
020 | |a 9780080488653 |c electronic bk. |9 978-0-08-048865-3 | ||
020 | |a 008048865X |c electronic bk. |9 0-08-048865-X | ||
020 | |a 1281035815 |9 1-281-03581-5 | ||
020 | |a 9781281035813 |9 978-1-281-03581-3 | ||
020 | |a 9786611035815 |9 9786611035815 | ||
020 | |a 6611035818 |9 6611035818 | ||
020 | |a 9781931836418 |9 978-1-931836-41-8 | ||
035 | |a (DE-627-1)047755857 | ||
035 | |a (DE-599)KEP047755857 | ||
035 | |a (ORHE)9781931836418 | ||
035 | |a (DE-627-1)047755857 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 004.678 |2 22 | |
100 | 1 | |a Fair, Ted |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cyber spying |b tracking your family's (sometimes) secret online lives |c Ted Fair, Michael Nordfelt, Sandra Ring, Eric Cole, technical editor |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c 2005 | |
300 | |a 1 Online-Ressource (xxiii, 439 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in. Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. *Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. *Targets a wide audience: personal computer users, specifically those interested in the online activities of their families. | ||
546 | |a English. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Internet | |
650 | 2 | |a Computer Security | |
650 | 2 | |a Internet | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Internet | |
650 | 4 | |a Internet | |
650 | 4 | |a Computer security | |
650 | 4 | |a Internet | |
700 | 1 | |a Nordfelt, Michael |e MitwirkendeR |4 ctb | |
700 | 1 | |a Ring, Sandra |e MitwirkendeR |4 ctb | |
700 | 1 | |a Cole, Eric |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781931836418 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781931836418 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781931836418/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047755857 |
---|---|
_version_ | 1821494858041262080 |
adam_text | |
any_adam_object | |
author | Fair, Ted |
author2 | Nordfelt, Michael Ring, Sandra Cole, Eric |
author2_role | ctb ctb ctb |
author2_variant | m n mn s r sr e c ec |
author_facet | Fair, Ted Nordfelt, Michael Ring, Sandra Cole, Eric |
author_role | aut |
author_sort | Fair, Ted |
author_variant | t f tf |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047755857 (DE-599)KEP047755857 (ORHE)9781931836418 |
dewey-full | 004.678 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.678 |
dewey-search | 004.678 |
dewey-sort | 14.678 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03244cam a22006132 4500</leader><controlfield tag="001">ZDB-30-ORH-047755857</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114029.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2005 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490253</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-025-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490252</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-025-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080488653</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-048865-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008048865X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-048865-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281035815</subfield><subfield code="9">1-281-03581-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281035813</subfield><subfield code="9">978-1-281-03581-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611035815</subfield><subfield code="9">9786611035815</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611035818</subfield><subfield code="9">6611035818</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836418</subfield><subfield code="9">978-1-931836-41-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047755857</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047755857</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781931836418</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047755857</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.678</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Fair, Ted</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber spying</subfield><subfield code="b">tracking your family's (sometimes) secret online lives</subfield><subfield code="c">Ted Fair, Michael Nordfelt, Sandra Ring, Eric Cole, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxiii, 439 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in. Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. *Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. *Targets a wide audience: personal computer users, specifically those interested in the online activities of their families.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nordfelt, Michael</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ring, Sandra</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cole, Eric</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781931836418</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781931836418</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781931836418/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047755857 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:03Z |
institution | BVB |
isbn | 1597490253 9781597490252 9780080488653 008048865X 1281035815 9781281035813 9786611035815 6611035818 9781931836418 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxiii, 439 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Fair, Ted VerfasserIn aut Cyber spying tracking your family's (sometimes) secret online lives Ted Fair, Michael Nordfelt, Sandra Ring, Eric Cole, technical editor Rockland, MA Syngress Pub. 2005 1 Online-Ressource (xxiii, 439 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in. Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. *Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. *Targets a wide audience: personal computer users, specifically those interested in the online activities of their families. English. Computer security Internet Computer Security Sécurité informatique Nordfelt, Michael MitwirkendeR ctb Ring, Sandra MitwirkendeR ctb Cole, Eric MitwirkendeR ctb 9781931836418 Erscheint auch als Druck-Ausgabe 9781931836418 |
spellingShingle | Fair, Ted Cyber spying tracking your family's (sometimes) secret online lives Computer security Internet Computer Security Sécurité informatique |
title | Cyber spying tracking your family's (sometimes) secret online lives |
title_auth | Cyber spying tracking your family's (sometimes) secret online lives |
title_exact_search | Cyber spying tracking your family's (sometimes) secret online lives |
title_full | Cyber spying tracking your family's (sometimes) secret online lives Ted Fair, Michael Nordfelt, Sandra Ring, Eric Cole, technical editor |
title_fullStr | Cyber spying tracking your family's (sometimes) secret online lives Ted Fair, Michael Nordfelt, Sandra Ring, Eric Cole, technical editor |
title_full_unstemmed | Cyber spying tracking your family's (sometimes) secret online lives Ted Fair, Michael Nordfelt, Sandra Ring, Eric Cole, technical editor |
title_short | Cyber spying |
title_sort | cyber spying tracking your family s sometimes secret online lives |
title_sub | tracking your family's (sometimes) secret online lives |
topic | Computer security Internet Computer Security Sécurité informatique |
topic_facet | Computer security Internet Computer Security Sécurité informatique |
work_keys_str_mv | AT fairted cyberspyingtrackingyourfamilyssometimessecretonlinelives AT nordfeltmichael cyberspyingtrackingyourfamilyssometimessecretonlinelives AT ringsandra cyberspyingtrackingyourfamilyssometimessecretonlinelives AT coleeric cyberspyingtrackingyourfamilyssometimessecretonlinelives |