Web 101 : making the Net work for you (Record no. 11042)

MARC details
000 -LEADER
fixed length control field 10261nam a2200217 a 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 0201704749
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780201704747
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 817808242X
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9788178082424
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.69
Item number LEH
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Lehnert, Wendy G. ;
245 ## - TITLE STATEMENT
Title Web 101 : making the Net work for you
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Boston :
Name of publisher Addison-Wesley,
Year of publication ©2001.
300 ## - PHYSICAL DESCRIPTION
Number of Pages xxxi, 736 p. :
Other physical details illustrations ;
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note First Things First --<br/>Taking Charge --<br/>Computer Basics --<br/>The Operating System --<br/>The Central Processing Unit --<br/>Memory --<br/>Units of Memory --<br/>The Bit --<br/>The Byte and Beyond --<br/>Speed and Bottlenecks --<br/>The Internet --<br/>Host Machines and Host Names --<br/>The Client/Server Software Model --<br/>Web-Based Software Hosting --<br/>The World Wide Web and Web Browsers --<br/>How to Get Online --<br/>Browser Tips and Tricks --<br/>Select Your Own Default Home Page --<br/>Use the Find Command --<br/>Use Your History List --<br/>Use Bookmarks --<br/>Add Bookmarks with Care --<br/>Abort a Download if You Get Stuck --<br/>Turn Off Graphics --<br/>Don't Let a "404 Not Found" Stop You Dead --<br/>Avoid Peak Hours --<br/>First Things First: Above and Beyond --<br/>A Little History --<br/>How Fast Are Different Internet Connections? --<br/>How Data Is Sent Over the Internet --<br/>How File Compression Works --<br/>Hypertext: Changing How People Read --<br/>Personal Safety Online --<br/>Taking Charge --<br/>Acceptable Use Policies --<br/>Password Security --<br/>Viruses, Trojans, and Worms --<br/>E-Mail Viruses --<br/>Macro Viruses --<br/>Script Attacks --<br/>Shopping Online --<br/>Protecting Your Privacy --<br/>Internet Scams --<br/>Online Auctions --<br/>Libel and Lawsuits --<br/>Threats and Harassment --<br/>Software Piracy and Copyright Infringements --<br/>Pornography and Other Lapses in Good Taste --<br/>Hoaxes and Legends --<br/>Personal Safety Online: Above and Beyond --<br/>The No Electronic Theft Act of 1997 --<br/>The Digital Millennium Copyright Act of 1998 --<br/>Plagiarism --<br/>Notice and Consent Policies --<br/>How Cookies Work --<br/>Privacy, Digital Records, and Commercial Interests --<br/>Broadband Risks and Remedies --<br/>Hacking: Phone Phreaks, Hackers, and Script Kiddies --<br/>E-Mail Management --<br/>Taking Charge --<br/>Basic E-Mail Client Operations --<br/>Anatomy of an E-Mail Message --<br/>What to Expect from Your Mail Client --<br/>Viewing Your Inbox --<br/>Viewing Individual Mail Messages --<br/>Sending a New Mail Message --<br/>Signatures --<br/>Importing Text into Messages --<br/>Importance of Good Writing --<br/>Replying To and Forwarding E-Mail Messages --<br/>Mime Attachments and HTML-Enabled Mailers --<br/>The MIME Protocol --<br/>HTML-Enabled Mailers --<br/>E-Mail Netiquette and Netspeak --<br/>Emoticons --<br/>Flames, Flaming, and Flame Wars --<br/>SMTP and Mail Servers --<br/>HTTP, POP, and IMAP --<br/>Hypertext Transfer Protocol --<br/>Post Office Protocol 3 and Internet Message Access Protocol --<br/>Filtering and Routing --<br/>Web-Based Mail Accounts --<br/>E-Mail Management: Above and Beyond --<br/>SPAM: Trouble in Paradise --<br/>How to Fight Back against SPAM --<br/>Managing Multiple E-Mail Accounts --<br/>Conquering Raggy Text --<br/>Uuencoded Mail --<br/>Basic Web Page Construction --<br/>Taking Charge --<br/>Web Page HTML Elements --<br/>What is HTML? --<br/>Editing HTML Files --<br/>Basic Web Page Formatting --<br/>Adding a Heading --<br/>Adding a List --<br/>Working with Fonts and Type Styles --<br/>Basic Web Page Graphics --<br/>Using Color --<br/>Working with Image Files --<br/>Three Types of Hyperlinks --<br/>Absolute URLs --<br/>Relative URLs --<br/>Named Anchors --<br/>Testing Your Hyperlinks --<br/>Page Layouts with Tables --<br/>Creating Borders by Using Tables --<br/>Creating Margins by Using Tables --<br/>Organizing Graphical Elements in Tables --<br/>Navigation Maps with Frames --<br/>Creating a Frame --<br/>A Web Site Construction Checklist --<br/>The Three C's of Web Page Design --<br/>Avoid Common Mistakes --<br/>Check Pages before Installing Them --<br/>Use Effective Web Page Titles --<br/>Keep Download Times Short --<br/>Make Your Pages Portable --<br/>Choose Between State-of-the-Art or Maximal Access --<br/>Installing Web Pages on A Web Server --<br/>Six Steps to Publish a Web Page --<br/>Uploading Your Pages --<br/>Copyright Law and the Web --<br/>Copyright Basics --<br/>What is Protected --<br/>Personal Use of Online Materials --<br/>Publishing on the Web --<br/>Fair Use Guidelines --<br/>Copyright Law in a Digital Era --<br/>Basic Web Page Construction: Above and Beyond --<br/>Graphics and Download Times --<br/>Audio Files for the Web --<br/>Copyright Guidelines for Multimedia Projects --<br/>HTML Editors and Web Page Construction Tools --<br/>How to Increase Your Web Page Hit Counts --<br/>Browser-Specific Extensions and Page Testing --<br/>Advanced Web Page Construction --<br/>Taking Charge --<br/>Client-Side Image Maps --<br/>Step 1: Loading an Image File --<br/>Step 2: Mapping the Hotzones --<br/>Step 3: Installing the Image Map --<br/>Javascript and Mouseover Events --<br/>JAVA Applets --<br/>Data-Driven Web Pages --<br/>Web Site Maintenance Tools --<br/>Link Checkers --<br/>Site Mappers --<br/>Site Construction Kits --<br/>Advanced Web Page Construction: Above and Beyond --<br/>Image Processing Utilities --<br/>CGI Scripts --<br/>How Far Can You Go Without Programming --<br/>Find What You Want --<br/>Fast! --<br/>Taking Charge --<br/>More About Subject Trees and Clearinghouses --<br/>Yahoo! --<br/>About --<br/>Open Directory Project --<br/>Clearinghouses --<br/>General Search Engines and META Search Engines --<br/>Some Ground Rules --<br/>Successive Query Refinement --<br/>Fuzzy Queries --<br/>Using Term Counts --<br/>Boolean Queries --<br/>Advanced Search Options --<br/>Specialized Search Engines --<br/>Search Bots and Intelligent Agents --<br/>Pull and Push Technologies --<br/>Assessing Credibility on the Web --<br/>Author Credibility --<br/>Accurate Writing and Documentation --<br/>Objectivity --<br/>Stability of Web Pages --<br/>Fraudulent Web Pages --<br/>Find What You Want --<br/>Fast!: Above and Beyond --<br/>Information Retrieval Concepts --<br/>Search Engine Web Coverage --<br/>Joining a Virtual Community --<br/>Taking Charge --<br/>Virtual Communities --<br/>Mailing Lists --<br/>Subscribing to Mailing Lists --<br/>Some Great Mailing Lists --<br/>Mailing List Netiquette --<br/>Netspeak --<br/>Web-Based Discussion Groups --<br/>Yahoo! Message Boards --<br/>Creating Your Own Discussion Group --<br/>Usenet Newsgroups --<br/>How Newsgroups Are Organized --<br/>How to Create a Newsgroup --<br/>Usenet Netiquette and Advertising --<br/>How Usenet News Servers Work --<br/>Usenet FAQ Files --<br/>Reading Usenet with a News Reader --<br/>The Three Levels of Usenet --<br/>Posting and Saving Messages --<br/>Keeping Track of Messages --<br/>Subscribing and Unsubscribing --<br/>Adding Signature Files --<br/>Cross-Posting Queries and Messages --<br/>Killing Articles --<br/>Experiment before Your First Post --<br/>Usenet News Readers versus Usenet on the Web --<br/>Locating Mailing Lists and Newsgroups --<br/>Internet Relay Chat, Web-Based Chat, and Instant Messaging --<br/>Internet Relay Chat --<br/>Web-Based Chat --<br/>Instant Messaging --<br/>The Psychology of Chat Rooms --<br/>Joining a Virtual Community: Above and Beyond --<br/>Censorship on the Internet --<br/>Cancelbots and NoCeM --<br/>Privacy Safeguards --<br/>Internet Telephony --<br/>Protecting Children --<br/>Software on the Internet --<br/>Taking Charge --<br/>Trouble-Free Downloads --<br/>Anti-Virus Protection --<br/>Installation Tips --<br/>Executable installers --<br/>Ready-to-Go Executables --<br/>Zipped File Archives --<br/>Self-Extracting Archives --<br/>ActiveX Installers --<br/>File Download Utilities --<br/>Software Clearinghouses --<br/>Some Popular Software Sites --<br/>Windows Software Sites --<br/>Macintosh Software Sites --<br/>FTP Software Archives --<br/>Managing Your Software --<br/>Three Rules for All Computer Users --<br/>Maintenance Tools --<br/>Finding Good Software Reviews --<br/>Software on the Internet: Above and Beyond --<br/>Software Licenses --<br/>Open Source Software --<br/>Trojan Horses --<br/>Power Tools for the Internet --<br/>Taking Charge --<br/>Applications: Helpers, Plug-Ins, and Add-Ons --<br/>Web Accelerators --<br/>Ad Filters --<br/>Download Managers --<br/>Password Managers --<br/>Desktop Portals --<br/>Alternative Web Browsers --<br/>FTP Client Power Features --<br/>File Type Detection and Selection --<br/>File Queues and Thread Counts --<br/>Auto Resume --<br/>Desktop Integration --<br/>Keep Alive --<br/>Customizable Toolbars --<br/>Search and Sort Options --<br/>Bookmarks and Macro Recorders --<br/>Power Tools for the Internet: Above and Beyond --<br/>Cookie Managers --<br/>Firewalls --<br/>Net Monitors --<br/>Telnet Clients --<br/>E-Commerce --<br/>Taking Charge --<br/>Buying Cars --<br/>Buying Books --<br/>Buying Unusual Items --<br/>Shopping for Supplies --<br/>Online Shopping Risks and Safeguards --<br/>Secure Servers and Secure Web Pages --<br/>Commercial Sites and Self-Regulation --<br/>Online Auctions --<br/>Take a Closer Look: Above and Beyond --<br/>E-Commerce, National Security, and Hackers --<br/>Digital Telephony and Convergence --<br/>Internet Appliances --<br/>Encryption and the Internet --<br/>Taking Charge --<br/>Private-Key Encryption --<br/>Public-Key Encryption --<br/>Digital Signatures --<br/>Key Management --<br/>Counterfeit Keys --<br/>Key Certification --<br/>Digital Certificates --<br/>Strong and Weak Encryption --<br/>Encryption and the Internet: Above and Beyond --<br/>Good Privacy (PGP) --<br/>Privacy-Enhanced E-mail --<br/>Fighting Spam with Encryption --<br/>Strong Encryption and the Culture of the Internet --<br/>Strong Encryption and Law Enforcement --<br/>U.S. Export Restrictions --<br/>Making It All Work For You --<br/>Taking Charge --<br/>Traps and Pitfalls --<br/>Telecommuting --<br/>Time-Saving Services --<br/>Staying On Top Of New Developments --<br/>Careers In Information Technology --<br/>Internet Addiction --<br/>The Truth is Out There --<br/>Internet Service Providers --<br/>How Much Does It Charge? --<br/>Is Its Modem Pool Reliable and Adequate for the Customer Base Served? --<br/>How Good Is Its Technical Support Staff? --<br/>Will It Let You Try Its Services Free For A Week? --<br/>Does It Offer Any Extra Services? --<br/>When To Talk To Technical Staff --<br/>HTML Tags and Attributes --<br/>Head, Title, And Body --<br/>Headings --<br/>Presentation Tags --<br/>Informational Tags --<br/>Text Formatting --<br/>Lists --<br/>Graphics --<br/>Hypertext Links --<br/>Frames --<br/>File Types --<br/>Macintosh Files --<br/>PC Files --<br/>UNIX Files --<br/>Proxy Servers --<br/>For Netscape Communicator --<br/>For Internet Explorer.
520 ## - SUMMARY, ETC.
Summary, etc Computer basics,the internet,.E mail management.Basic web page contruction.Advanced web page contruction.Power tools for the internet.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term World Wide Web.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Internet.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer network resources.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Reference Books
Holdings
Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Full call number Accession Number Koha item type
Reference Main Library Main Library Reference 08/03/2004 Purchased 1050.00 004.69 LEH 008545 Reference Books

© University of Vavuniya

------