Protecting Your PC (Record no. 342)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01716nam a2200205Ia 4500 |
001 - CONTROL NUMBER | |
control field | 1518 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200701111607.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 180531s9999||||xx |||||||||||||| ||und|| |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9788131502457 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | PK-IsLIS |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Item number | B252 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Barile, Ian |
245 #0 - TITLE STATEMENT | |
Title | Protecting Your PC |
Statement of responsibility, etc | / Ian Barile |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Name of publisher, distributor, etc | Thomson, |
Place of publication, distribution, etc | India : |
Date of publication, distribution, etc | 2007 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xix, 364 p. |
500 ## - GENERAL NOTE | |
General note | includes index |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks--Security measures |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Introduction PART I Getting Started Chapter 1 The What's and Why's of Computer Security Chapter 2 Where Are You At? PART II Malware Chapter 3 Viruses, Worms, and Trojans Chapter 4 Stopping Those Pesky Pop-Ups, Putting an End to Spyware PART III Networking in the Home Chapter 5 Getting to the Internet, Internet Service Providers (isps) Chapter 6 Stopping the Hacker Onslaught Chapter 7 Going Wireless PART IV The Internet Chapter 8 Untangling the Web Chapter 9 Locking Down Internet Explorer Chapter 10 Shopping and Banking Online Chapter 11 Email, How Private Is It? Chapter 12 Spam-It's Not Canned Ham Chapter 13 Phishing, Don't Give Away Your Personal Information Chapter 14 Securing Your Email Client Chapter 15 The Do's and Don'ts of Instant Messaging and Chat Rooms PART V System Maintenance Chapter 16 Filling the Holes, System and Application Patching Chapter 17 Saving Yourself from the Delete Key PART VI Protecting People and Information Chapter 18 Passwords Chapter 19 Protecting Your Privacy, Personal and Confidential Information Chapter 20 Kids, Computers, and the Internet Appendix A Web Resources Appendix B Security Checklists Appendix C The Law, Computers, and You Appendix D About the CD-ROM Index |
Withdrawn status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
UE-Central Library | UE-Central Library | 01.06.2018 | U.E. | 005.8 B252 | T1518 | 01.06.2018 | 01.06.2018 | Books |