Absolute Beginner's Guide to Computers and the Internet


Book Description

Discusses such electronic privacy concerns as what privacy is, how it relates to individuals, laws and regulations, identity theft, monitoring devices, and how to protect Internet transactions.




Networks of New York


Book Description

A guided tour of the physical Internet, as seen on, above, and below the city’s streets What does the Internet look like? It’s the single most essentail aspect of modern life, and yet, for many of us, the Internet looks like an open browser, or the black mirrors of our phones and computers. But in Networks of New York, Ingrid Burrington lifts our eyes from our screens to the streets, showing us that the Internet is everywhere around us, all the time—we just have to know where to look. Using New York as her point of reference and more than fifty color illustrations as her map, Burrington takes us on a tour of the urban network: She decodes spray-painted sidewalk markings, reveals the history behind cryptic manhole covers, shuffles us past subway cameras and giant carrier hotels, and peppers our journey with background stories about the NYPD's surveillance apparatus, twentieth-century telecommunication monopolies, high frequency trading on Wall Street, and the downtown building that houses the offices of both Google and the FBI's Joint Terrorism Task Force. From a rising star in the field of tech jounalism, Networks of New York is a smart, funny, and beautifully designed guide to the endlessly fascinating networks of urban Internet infrastructure. The Internet, Burrington shows us, is hiding in plain sight.




The Underground Guide to UNIX


Book Description

This lively, irreverent book gives straighforward advice on the best way to perform any task in the UNIX environment. Regardless of the UNIX version used by the reader, John Montgomery unlocks the mysteries of the file system and covers all the essentials for exploiting the power of the UNIX operating system. For practical advice on everything from customizing any UNIX environment, to preventing and surviving common UNIX disasters, this book is fun for serious users.




Crime and Society


Book Description

Much of a society’s resources are devoted to dealing with, or preparing for the possibility of, crime. The dominance of concerns about crime also hint at the broader implications that offending has for many different facets of society. They suggest that rather than being an outlawed subset of social activity, crime is an integrated aspect of societal processes. This book reviews some of the direct and indirect social impacts of criminality, proposing that this is worthwhile, not just in terms of understanding crime, but also because of how it elucidates more general social considerations. A range of studies that examine the interactions between crime and society are brought together, drawing on a wide range of countries and cultures including India, Israel, Nigeria, Turkey, and the USA, as well as the UK and Ireland. They include contributions from many different social science disciplines, which, taken together, demonstrate that the implicit and direct impact of crime is very widespread indeed. The chapters in this book were originally published as a special issue of Contemporary Social Science.




Protecting Patron Privacy


Book Description

Protect patron privacy and safeguard Internet usage using this how-to manual for creating a secure environment in your library. You'll learn how simple changes to your policies, procedures, and computer settings can ensure a private and safe research space for users. In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research—if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount importance, explains the applicable laws and regulations related to patron privacy, and delves into the mechanics of security breaches on public computers. The second half outlines the practical steps you can take to preserve the rights of library visitors by working with computer and mobile device configurations, network security settings, and special applications.




Absolute Beginner's Guide to Computer Basics, Portable Documents


Book Description

Everything casual users need to know to get the most out of their new Windows 7 PCs, software, and the Internet The best-selling beginner's guide, now completely updated for Windows 7 and today's most popular Internet tools - including Facebook, craigslist, Twitter, and Wikipedia Easy step-by-step instructions cover setting up a new PC, getting online, working with digital media, using productivity tools, and much more By the world's #1 author of beginning technology books, Michael Miller This year, you may be one of the millions of casual computer users that will buy a new Windows 7 notebook or desktop PC. You'll want to know how to find your way around, get comfortable, and get the job done - without jargon, complexity, or hassle. There's a book for you: Michael Miller's Absolute Beginner's Guide to Computer Basics, Windows 7 Edition. It's the one book that covers everything today's beginners and near-beginners need to know: not just about Windows, but also about software, hardware, and the Internet. Through 90+ books, author Michael Miller has established an unparalleled track record in explaining complicated concepts simply and clearly, and empowering beginners. Now, he's thoroughly updated his best-selling Absolute Beginner's Guide to Computer Basics to cover today's user experience - with Windows 7, Internet Explorer 8, and today's hottest online tools, from craigslist and Facebook to Twitter, Wikipedia, and Google Docs. Miller offers step-by-step instructions and friendly, practical advice for making the most of Windows 7's improvements, including the new taskbar, Action Center, and Aero Snap. He walks through setting up a new computer; connecting to the Internet; working with digital media; burning custom CDs; watching DVD movies; using Microsoft Office and other popular software; managing money online; setting up home networks; keeping PCs running reliably; and protecting them from spam, viruses, and spyware. This is the one indispensable book for today's PC novice.




Powering Up a Career in Internet Security


Book Description

While the continued growth of the Internet has opened unprecedented possibilities for users, it has been accompanied by an upsurge in data breaches and cyberattacks that continue to threaten ordinary individuals as well as banks, businesses, and international relations. As we explore the still-uncharted frontiers of the web, the demand for professionals who can develop software, monitor electronic data, test systems for vulnerabilities, and more has skyrocketed. This volume guides readers past the firewalls and shows them what it takes to become an entry-level worker and how to climb the ladder to become a specialist in the ever-expanding field of cybersecurity.




Handbook of Communications Security


Book Description

Communications represent a strategic sector for privacy protection and for personal, company, national and international security. The interception, damage or lost of information during communication can generate material and non material economic damages from both a personal and collective point of view. The purpose of this book is to give the reader information relating to all aspects of communications security, beginning at the base ideas and building to reach the most advanced and updated concepts. The book will be of interest to integrated system designers, telecommunication designers, system engineers, system analysts, security managers, technicians, intelligence personnel, security personnel, police, army, private investigators, scientists, graduate and postgraduate students and anyone that needs to communicate in a secure way.




Information Security Management Handbook


Book Description

Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the C




MP3 and the Infinite Digital Jukebox


Book Description

With MP3 technology, the era of accessing the full range of the world's music and customizing it to individual taste has arrived. Written by music industry insider and former computer programmer Chris Gilbey, MP3 and the Infinite Digital Jukebox shows how to take advantage of this revolution. The book offers clear and simple instructions on how and where to find all the necessary applications for getting instant musical gratification from the new online music devices on the market. Topics covered include information about all the music file types, how to play them, how to "rip" them, how to burn your own CDs, and how to send music to others. The book reviews all the latest software and hardware, but also shows how it's possible to avoid the expense and use existing resources.