%{search_type} search results

72,507 catalog results

RSS feed for this result
2, 5, 6, 312 p., [4] p. of plates : col. ill. ; 22 cm.
East Asia Library
13 videocassettes (ca. 6 hrs.) : sd., col. ; 1/2 in.
  • [pt. 1] Digital doctors
  • [pt. 2] Hollynet
  • [pt. 3] Next stop-the future
  • [pt. 4] Cyber students
  • [pt. 5] Sounds from cyberspace
  • [pt. 6] Internauts
  • [pt. 7] Net profits
  • [pt. 8] Internetworking
  • [pt. 9] Electric ink
  • [pt. 10] Cyber secrets
  • [pt. 11] Electric mail
  • [pt. 12] Spiritual surfers
  • [pt. 13] Digital dollars.
National Public Radio's Scott Simon hosts the series, presenting the human side of this global technology. Shows how people use the Internet to make a difference in their lives.
Media & Microtext Center
computer files
Medical Library (Lane)
1 online resource (xviii, 397 pages) : illustrations
ix, 202 p. : ill. ; 24 cm.
149 p. ; 26 cm.
  • A behavioral perspective on technology evolution and domain name regulation / Todd Davies
  • ICANN Internet governance : is it working? / Steve DelBianco, Braden Cox
  • Transnational telecommunications patents and legislative jurisdiction / Cameron Hutchison, Moin Yahya
  • Aristotle, Europe and Internet governance / Konstantinos Komaitis
  • ICANN can : contracts and porn sites-choosing "to play Internet ball in American cyberspace" / Brent A. Little, Cheryl B. Preston
  • The political economy of the intellectual property regime-building in China : evidence from the evolution of the Chinese patent regime / Kong Qingjiang.
Law Library (Crown)
xii, pages 1087-1370 ; 26 cm
  • ICANN 2.0 : meet the new boss / A. Michael Froomkin
  • From self-governance to public-private partnership : the changing role of governments in the management of the internet's core resources / Wolfgang Kleinwachter
  • A commentary on the ICANN "blueprint" for evolution and reform / David R. Johnson, David Post, Susan P. Crawford
  • ICANN and the concept of democratic deficit / Dan Hunter
  • About a different kind of water : an attempt at describing and understanding some elements of the European Union approach to ICANN / Herbert Burkert
  • Governance in namespaces / Stefan Bechtold.
Law Library (Crown)
13 videocassettes (30 min. each) : sd., col. ; 1/2 in.
  • [pt. 1] Finding things
  • [pt. 2.] Coming attractions
  • [pt. 3] Cyber gourmet
  • [pt. 4] Young, smart, and on line
  • [pt. 5] Net work
  • [pt. 6] Art on the Net
  • [pt. 7] Searching for a cure
  • [pt. 8] The invisible Net
  • [pt. 9] Virtual neighbors
  • [pt. 10] Copyright
  • [pt. 11] Finding people
  • [pt. 12] Cyber stocks
  • [pt. 13] Net Safe.
Serves as a way for communications faculty to introduce students to the extensive changes in mass communications brought about by the Internet. Focuses on the ways individuals use the Internet to make a difference in their lives.
Media & Microtext Center
283 pages : illustrations ; 21 cm.
East Asia Library
1 online resource (373 pages) : color illustrations, charts.
x, 135 p. : ill.
1 online resource (xvi, 465 p.)
dx.doi.org SpringerLink
xi, 240 p. ; 24 cm.
  • New lessons from the Internet
  • What the steam engine can teach us about the Internet
  • Overconnectivity and surprises
  • How overconnectivity can both make us and break us
  • Expect more accidents and contagions
  • The ghost in our midst - Why the Internet is accident-prone
  • From fishing to finance
  • How the Internet tricked Iceland
  • Positive feedback and horrendous financial crashes
  • How the Internet supercharged the subprime crisis
  • Positive feedback and information efficiency at work
  • How overconnectivity stole your privacy
  • Everything is interconnected, part I
  • Everything is interconnected, part II
  • What now?
  • What now, continued : Katrina, social security, and a tribe of aborigines.
Argues that the success of the Internet and World Wide Web has also brought about a variety of unique hazards, including being overconnected, which has a negative impact on economics, politics, and one's day-to-day life.
Business Library
xviii, 301 p. : ill. ; 24 cm.
Law Library (Crown)
ix, 248 p. : ill. ; 23 cm.
Green Library
xxi, 521 p. : ill., map ; 25 cm.
Introducing the basic concepts in total program control of the intelligent agents and machines, "Intelligent Internet Knowledge Networks" explores the design and architecture of information systems that include and emphasize the interactive role of modern computer/communication systems and human beings. Here, you'll discover specific network configurations that sense environments, presented through case studies of IT platforms, electrical governments, medical networks, and educational networks.
(source: Nielsen Book Data)9780471788560 20160528
dx.doi.org Wiley Online Library
SAL3 (off-campus storage)
1 online resource (140 pages)
1 online resource (xviii, 361 p.) : ill.
  • The early hackers The PC pioneers The internet hackers The real world hackers The future - hacking for profit Protecting your computer & yourself.
  • (source: Nielsen Book Data)9781593271053 20160605
National bestseller with over 175,000 copies sold! If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths, and never accepting at face value anything authorities say or do. The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineering and lock picking, exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information. Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving stories of questionable accuracy. Inside, you'll discover: How to manage and fight spam and spyware How Trojan horse programs and rootkits work, and how to defend against them How hackers steal software and defeat copy-protection mechanisms How to tell if your machine is being attacked and what you can do to protect it Where the hackers are, how they probe a target and sneak into a computer, and what they do once they get inside How corporations use hacker techniques to infect your computer and invade your privacy How you can lock down your computer to protect your data and your personal information using free programs included on the book's CD If you ve ever logged onto a website, conducted an online transaction, sent or received email, used a networked computer, or even watched the evening news, you may have already been tricked, tracked, hacked, and manipulated. As the saying goes, just because you're paranoid doesn't mean they aren't after you. And, as Wallace Wang reveals, they probably are. The companion CD contains hundreds of megabytes of 100% FREE hacking and security-related programs, like keyloggers, spyware stoppers, port blockers, IP scanners, Trojan horse detectors, and much, much more. CD compatible with Windows, Mac, and Linux.
(source: Nielsen Book Data)9781593271053 20160605
xiii, 239 p. : ill. ; 25 cm.
What began as an intrepid U.S. Government initiative in the early 1970's has turned into a global way of life. Indeed, with more than 500 million current users (and counting), the Internet has revolutionized the way societies function the world over. From dating and shopping online, to conducting informational research, to communicating via email, today seemingly everyone uses the Internet for one purpose or another. How, then, can something so vast and powerful be defiled by something as trivial as spam? It's true. The fact remains that despite the leading-edge technological sophistication fueling the Net, there are still many related annoyances that complicate and tarnish the Internet experience. And it doesn't matter if you're a homemaker in search of a fresh chicken recipe, or a civil engineer researching plans for a new skyscraper, the problems are the same. Internet Annoyances understands the universal nature of the Internet and strives to make its use as stress-free as possible. This insightful guide shows you how to overcome the most annoying Internet-related quirks, bugs, and hassles. You'll learn how to make a seamless connection, thwart would-be hackers, ensure greater security while surfing, eliminate pop-up ads, maximize online services, conduct more effective Google searches, better utilize digital media (music and video), and much more. In addition, Internet Annoyances discusses how to design and host a personal web site something once thought of as only possible for the technically gifted. Topics like blogs, domain names, setup, HTML, fonts, and graphics and are all dissected and analyzed for easy consumption. Unlike other books on the subject, Internet Annoyances assumes readers already possess a working knowledge of the Internet. By fully recognizing the experience level of today's Internet culture, author Preston Galla is able to cut immediately to the chase and not waste time on the more obvious points. Internet Annoyances, therefore, is a quick read that presents succinct solutions for the many glitches that still populate the Internet experience.
(source: Nielsen Book Data)9780596007355 20160528


Journal articles, e-books, & other e-resources
Articles+ results include