Amazon cover image
Image from Amazon.com

How Personal and Internet Security Work

By: Material type: TextTextPublication details: India Que/Pearson Publication 2012Description: 280pISBN:
  • 9788131788141
Subject(s): DDC classification:
  • 005.8 GRA
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Item location Collection Call number Status Date due Barcode Item holds
Book Book NIMA Knowledge Centre 9th Floor Reading Zone General 005.8 GRA (Browse shelf(Opens below)) Available T0041101
Book Book NIMA Knowledge Centre 9th Floor Reading Zone General 005.8 GRA (Browse shelf(Opens below)) Available T0041102
Book Book NIMA Knowledge Centre 9th Floor Reading Zone General 005.8 GRA (Browse shelf(Opens below)) Available T0041103
Book Book NIMA Knowledge Centre 9th Floor Reading Zone General 005.8 GRA (Browse shelf(Opens below)) Available T0041104
Book Book NIMA Knowledge Centre 9th Floor Reading Zone General 005.8 GRA (Browse shelf(Opens below)) Available T0041105
Book Book NIMA Knowledge Centre 9th Floor Reading Zone General 005.8 GRA (Browse shelf(Opens below)) Available T0041106
Book Book NIMA Knowledge Centre 9th Floor Reading Zone General 005.8 GRA (Browse shelf(Opens below)) Available T0041107
Book Book NIMA Knowledge Centre 9th Floor Reading Zone General 005.8 GRA (Browse shelf(Opens below)) Available T0041108
Book Book NIMA Knowledge Centre 9th Floor Reading Zone General 005.8 GRA (Browse shelf(Opens below)) Available T0041109
Reference Book Reference Book NIMA Knowledge Centre 7th Floor Silence Zone Reference 005.8 GRA (Browse shelf(Opens below)) Not For Loan T0041100
Total holds: 0

Introduction Part - 1: Internet Security How the Internet Works How Hackers Break in to Your PC and How to Protect Against Them How Spyware and Anti Spyware Work How Websites Invade Your Privacy The Dangers of Internet Search How Phishing Attacks Can Steel Your Identity and How to Protect against Them How Zombies and Trojan Horses Attack You and How to Protect Against Them The Security Dangers in Browsers How Worms and Viruses Do Their Damage and How to Protect Against Them Wi Fi Security Dangers and Protections Bluetooth Security Dangers How Instant Messaging Pests Worked-out How Spam Works and How to Fight It How Denial of Service Attacks Bring Down Websites How Virtual Private Networks and Encryption Keep You Safe How Web Blocking and Parental Controls Work How Personal Firewalls and Proxy Servers Protect You Part - 2: Personal Privacy and Security How Identity Theft Works Credit Card Security The Dangers of Data Mining The Dangers of Workplace Surveillance How Cell Phones Can Be Hacked How Biometrics Works How Radio Frequency ID Can Invade Your Privacy How Location Tracking Works How DNA Matching Works How Airport Scanners and Screening Systems Work The Federal

There are no comments on this title.

to post a comment.
© 2025 by NIMA Knowledge Centre, Ahmedabad.
Koha version 24.05