Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
First Things First | |
Taking Charge | |
Computer Basics | |
Units of Memory | |
The Internet | |
Host Machines and Host Names | |
Speed and Bottlenecks | |
The Client/Server Software Model | |
The World Wide Web and Web Browsers | |
How to Get Online | |
Browser Tips and Tricks | |
Alternate Web Browsers | |
Personal Safety Online | |
Taking Charge | |
Acceptable Use Policies | |
Password Security | |
Phishing and Identity Theft | |
Viruses, Trojan Horses, and Worms | |
E-Mail Viruses | |
Hacker Attacks and Intrusions | |
Firewalls | |
Protecting Your Privacy | |
Libel and Lawsuits | |
Threats and Harassment | |
Software Piracy and Copyright Infringements | |
Pornography and Other Lapses in Good Taste | |
Hoaxes and Legends | |
Laptops and Wireless Networks | |
Summary of Cyberworld Risks and Hazards | |
E-Mail Management | |
Taking Charge | |
Basic E-Mail Client Operations | |
MIME Attachments and HTML-Enabled Clients | |
E-Mail Netiquette and Netspeak | |
SMTP and Mail Servers | |
HTTP, POP, and IMAP | |
Filtering and Routing | |
Web-Based E-Mail Accounts | |
Web 2.0 | |
Getting Started | |
Blogs | |
Social Networking | |
RSS | |
Wikis and Folksonomies | |
Discussion Groups | |
Internet Relay Chat, Web-Based Chat, and Instant Messaging | |
The Psychology of Chat Rooms | |
Google Earth | |
Find What You Want-Fast! | |
Taking Charge | |
More about Subject Trees and Clearinghouses | |
General Search Engines and Meta Search Engines | |
Tools of the Trade | |
Searching the "Invisible Web" | |
Assessing Credibility on the Web | |
Software on the Internet | |
Taking Charge | |
Open Source versus Proprietary Software versus Freeware | |
File Formats | |
Trouble-Free Downloads | |
Antivirus Protection | |
Installation Tips | |
Spyware and Adware | |
File Download Utilities | |
Software Clearinghouses | |
FTP Software Archives and Clients | |
Managing Your Software | |
Finding Good Software Reviews | |
E-Commerce | |
Taking Charge | |
Online Shopping Risks and Safeguards | |
Secure Servers and Secure Web Pages | |
Commercial and Self-Regulation | |
Online Auctions | |
Encryption and the Internet | |
Taking Charge | |
Private-Key Encryption | |
Public-Key Encryption | |
Digital Signatures | |
Key Management | |
Counterfeit Keys | |
Key Certification | |
Digital Certificates | |
Strong and Weak Encryption | |
Basic Web Page Construction | |
Taking Charge | |
Copyright Basics | |
Planning Your Web Page | |
Creatng Web Pages with a WYSIWYG Editor | |
Publishing Your Web Page | |
Image File Formats | |
All about Color | |
Background Patterns | |
Image-Processing Utilities | |
Creating a Navigation Bar | |
A Web Site Construction Checklist | |
Advanced Web Page Construction | |
Taking Charge | |
What Is HTML? | |
Style Sheets | |
Client-Side Image Maps | |
Introduction to Interactive Web Pages | |
Web Pages and Scripting Alternatives | |
Taking Charge | |
CGI Scripts | |
Java Applets | |
Data-Driven Web Pages | |
XMP | |
AJAX | |
PHP | |
How Far Can You Go without Programming? | |
Each chapter concludes with Things to Remember, Important Concepts | |
Where Can I Learn More? | |
Problems and Exercises, and Above & Beyond | |
Appendixes | |
HTML Tags and Attributes | |
Style Sheets | |
UNIX File Types | |
All about Copyright | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.