LEADER 03061nam a2200385Ii 4500 001 991003257539707536 006 m d 007 cr cn||||||||| 008 070806s2005 maua s 001 0 eng d 020 $a9781931836418 020 $a1931836418 035 $ab13656351-39ule_inst 037 $a110568:110617$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS 049 $aTEFA 082 04$a004.678$222 245 00$aCyber spying$h[electronic resource] :$btracking your family's (sometimes) secret online lives /$cTed Fair ... [et al.]. 260 $aRockland, Mass. :$bSyngress,$cc2005. 300 $axxiii, 439 p. :$bill. ;$c24 cm. 500 $aIncludes index. 505 0 $aWhy Spy? ; Spying Basics ; Technology Overview, Computer Basics ; Technology Overview, Network Basics ; Step 1: Taking Control ; Step 2, Spying on the PC ; Spying on E-mail ; Spying on Chat and Instant Messaging ; Spying on Web Browsing ; Advanced Spying ; Counter-Spy, Are You Being Watched? 520 $aThis book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in. Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. *Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. *Targets a wide audience: personal computer users, specifically those interested in the online activities of their families. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on Aug. 2, 2007).$nAccess may be restricted to users at subscribing institutions. 650 0$aMicrocomputers$xAccess control. 650 0$aInternet$xCensorship. 655 7$aElectronic books.$2local 700 1 $aFair, Ted.$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0739077 776 1 $cOriginal$z1931836418$z9781931836418$w(OCoLC)57354576 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9781931836418$zAn electronic book accessible through the World Wide Web; click for information 907 $a.b13656351$b24-02-22$c24-01-08 912 $a991003257539707536 994 $aC0$bTEF 996 $aCyber spying$91464029 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gmau$h0$i0