Welcome to UE Central Library

Keep Smiling

Protecting Your PC (Record no. 342)

MARC details
000 -LEADER
fixed length control field 01716nam a2200205Ia 4500
001 - CONTROL NUMBER
control field 1518
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200701111607.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180531s9999||||xx |||||||||||||| ||und||
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788131502457
040 ## - CATALOGING SOURCE
Transcribing agency PK-IsLIS
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number B252
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Barile, Ian
245 #0 - TITLE STATEMENT
Title Protecting Your PC
Statement of responsibility, etc / Ian Barile
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc Thomson,
Place of publication, distribution, etc India :
Date of publication, distribution, etc 2007
300 ## - PHYSICAL DESCRIPTION
Extent xix, 364 p.
500 ## - GENERAL NOTE
General note includes index
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks--Security measures
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction PART I Getting Started Chapter 1 The What's and Why's of Computer Security Chapter 2 Where Are You At? PART II Malware Chapter 3 Viruses, Worms, and Trojans Chapter 4 Stopping Those Pesky Pop-Ups, Putting an End to Spyware PART III Networking in the Home Chapter 5 Getting to the Internet, Internet Service Providers (isps) Chapter 6 Stopping the Hacker Onslaught Chapter 7 Going Wireless PART IV The Internet Chapter 8 Untangling the Web Chapter 9 Locking Down Internet Explorer Chapter 10 Shopping and Banking Online Chapter 11 Email, How Private Is It? Chapter 12 Spam-It's Not Canned Ham Chapter 13 Phishing, Don't Give Away Your Personal Information Chapter 14 Securing Your Email Client Chapter 15 The Do's and Don'ts of Instant Messaging and Chat Rooms PART V System Maintenance Chapter 16 Filling the Holes, System and Application Patching Chapter 17 Saving Yourself from the Delete Key PART VI Protecting People and Information Chapter 18 Passwords Chapter 19 Protecting Your Privacy, Personal and Confidential Information Chapter 20 Kids, Computers, and the Internet Appendix A Web Resources Appendix B Security Checklists Appendix C The Law, Computers, and You Appendix D About the CD-ROM Index
Holdings
Withdrawn status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Full call number Barcode Date last seen Price effective from Koha item type
      UE-Central Library UE-Central Library 01.06.2018 U.E. 005.8 B252 T1518 01.06.2018 01.06.2018 Books
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk