%{search_type} search results

73,141 catalog results

RSS feed for this result
Book
2, 5, 6, 312 p., [4] p. of plates : col. ill. ; 22 cm.
East Asia Library
Video
13 videocassettes (ca. 6 hrs.) : sd., col. ; 1/2 in.
  • [pt. 1] Digital doctors
  • [pt. 2] Hollynet
  • [pt. 3] Next stop-the future
  • [pt. 4] Cyber students
  • [pt. 5] Sounds from cyberspace
  • [pt. 6] Internauts
  • [pt. 7] Net profits
  • [pt. 8] Internetworking
  • [pt. 9] Electric ink
  • [pt. 10] Cyber secrets
  • [pt. 11] Electric mail
  • [pt. 12] Spiritual surfers
  • [pt. 13] Digital dollars.
National Public Radio's Scott Simon hosts the series, presenting the human side of this global technology. Shows how people use the Internet to make a difference in their lives.
Media & Microtext Center, Stanford Libraries
Book
computer files
Medical Library (Lane)
Book
1 online resource (66 pages) : illustrations
Book
1 online resource (xviii, 397 pages) : illustrations
Book
ix, 202 p. : ill. ; 24 cm.
Book
149 p. ; 26 cm.
  • A behavioral perspective on technology evolution and domain name regulation / Todd Davies
  • ICANN Internet governance : is it working? / Steve DelBianco, Braden Cox
  • Transnational telecommunications patents and legislative jurisdiction / Cameron Hutchison, Moin Yahya
  • Aristotle, Europe and Internet governance / Konstantinos Komaitis
  • ICANN can : contracts and porn sites-choosing "to play Internet ball in American cyberspace" / Brent A. Little, Cheryl B. Preston
  • The political economy of the intellectual property regime-building in China : evidence from the evolution of the Chinese patent regime / Kong Qingjiang.
Law Library (Crown)
Book
xii, pages 1087-1370 ; 26 cm
  • ICANN 2.0 : meet the new boss / A. Michael Froomkin
  • From self-governance to public-private partnership : the changing role of governments in the management of the internet's core resources / Wolfgang Kleinwachter
  • A commentary on the ICANN "blueprint" for evolution and reform / David R. Johnson, David Post, Susan P. Crawford
  • ICANN and the concept of democratic deficit / Dan Hunter
  • About a different kind of water : an attempt at describing and understanding some elements of the European Union approach to ICANN / Herbert Burkert
  • Governance in namespaces / Stefan Bechtold.
Law Library (Crown)
Video
13 videocassettes (30 min. each) : sd., col. ; 1/2 in.
  • [pt. 1] Finding things
  • [pt. 2.] Coming attractions
  • [pt. 3] Cyber gourmet
  • [pt. 4] Young, smart, and on line
  • [pt. 5] Net work
  • [pt. 6] Art on the Net
  • [pt. 7] Searching for a cure
  • [pt. 8] The invisible Net
  • [pt. 9] Virtual neighbors
  • [pt. 10] Copyright
  • [pt. 11] Finding people
  • [pt. 12] Cyber stocks
  • [pt. 13] Net Safe.
Serves as a way for communications faculty to introduce students to the extensive changes in mass communications brought about by the Internet. Focuses on the ways individuals use the Internet to make a difference in their lives.
Media & Microtext Center, Stanford Libraries
Book
283 pages : illustrations ; 21 cm.
East Asia Library
Book
1 online resource (373 pages) : color illustrations, charts.
Book
x, 135 p. : ill.
Book
1 online resource (xvi, 465 p.)
dx.doi.org SpringerLink
Book
xi, 240 p. ; 24 cm.
  • New lessons from the Internet
  • What the steam engine can teach us about the Internet
  • Overconnectivity and surprises
  • How overconnectivity can both make us and break us
  • Expect more accidents and contagions
  • The ghost in our midst - Why the Internet is accident-prone
  • From fishing to finance
  • How the Internet tricked Iceland
  • Positive feedback and horrendous financial crashes
  • How the Internet supercharged the subprime crisis
  • Positive feedback and information efficiency at work
  • How overconnectivity stole your privacy
  • Everything is interconnected, part I
  • Everything is interconnected, part II
  • What now?
  • What now, continued : Katrina, social security, and a tribe of aborigines.
Argues that the success of the Internet and World Wide Web has also brought about a variety of unique hazards, including being overconnected, which has a negative impact on economics, politics, and one's day-to-day life.
Business Library
Book
xviii, 301 p. : ill. ; 24 cm.
Law Library (Crown)
Book
ix, 248 p. : ill. ; 23 cm.
Green Library
Book
xxi, 521 p. : ill., map ; 25 cm.
Introducing the basic concepts in total program control of the intelligent agents and machines, "Intelligent Internet Knowledge Networks" explores the design and architecture of information systems that include and emphasize the interactive role of modern computer/communication systems and human beings. Here, you'll discover specific network configurations that sense environments, presented through case studies of IT platforms, electrical governments, medical networks, and educational networks.
(source: Nielsen Book Data)9780471788560 20160528
dx.doi.org Wiley Online Library
SAL3 (off-campus storage)
Book
1 online resource (140 pages)
Book
1 online resource (xviii, 361 p.) : ill.
  • The early hackers The PC pioneers The internet hackers The real world hackers The future - hacking for profit Protecting your computer & yourself.
  • (source: Nielsen Book Data)9781593271053 20160605
National bestseller with over 175,000 copies sold! If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths, and never accepting at face value anything authorities say or do. The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineering and lock picking, exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information. Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving stories of questionable accuracy. Inside, you'll discover: How to manage and fight spam and spyware How Trojan horse programs and rootkits work, and how to defend against them How hackers steal software and defeat copy-protection mechanisms How to tell if your machine is being attacked and what you can do to protect it Where the hackers are, how they probe a target and sneak into a computer, and what they do once they get inside How corporations use hacker techniques to infect your computer and invade your privacy How you can lock down your computer to protect your data and your personal information using free programs included on the book's CD If you ve ever logged onto a website, conducted an online transaction, sent or received email, used a networked computer, or even watched the evening news, you may have already been tricked, tracked, hacked, and manipulated. As the saying goes, just because you're paranoid doesn't mean they aren't after you. And, as Wallace Wang reveals, they probably are. The companion CD contains hundreds of megabytes of 100% FREE hacking and security-related programs, like keyloggers, spyware stoppers, port blockers, IP scanners, Trojan horse detectors, and much, much more. CD compatible with Windows, Mac, and Linux.
(source: Nielsen Book Data)9781593271053 20160605

Articles+

Journal articles, e-books, & other e-resources
Articles+ results include