Image from Google Jackets

Web 101 : making the Net work for you

By: Material type: TextTextPublication details: Boston : Addison-Wesley, ©2001.Description: xxxi, 736 p. : illustrationsISBN:
  • 0201704749
  • 9780201704747
  • 817808242X
  • 9788178082424
Subject(s): DDC classification:
  • 004.69 LEH
Contents:
First Things First -- Taking Charge -- Computer Basics -- The Operating System -- The Central Processing Unit -- Memory -- Units of Memory -- The Bit -- The Byte and Beyond -- Speed and Bottlenecks -- The Internet -- Host Machines and Host Names -- The Client/Server Software Model -- Web-Based Software Hosting -- The World Wide Web and Web Browsers -- How to Get Online -- Browser Tips and Tricks -- Select Your Own Default Home Page -- Use the Find Command -- Use Your History List -- Use Bookmarks -- Add Bookmarks with Care -- Abort a Download if You Get Stuck -- Turn Off Graphics -- Don't Let a "404 Not Found" Stop You Dead -- Avoid Peak Hours -- First Things First: Above and Beyond -- A Little History -- How Fast Are Different Internet Connections? -- How Data Is Sent Over the Internet -- How File Compression Works -- Hypertext: Changing How People Read -- Personal Safety Online -- Taking Charge -- Acceptable Use Policies -- Password Security -- Viruses, Trojans, and Worms -- E-Mail Viruses -- Macro Viruses -- Script Attacks -- Shopping Online -- Protecting Your Privacy -- Internet Scams -- Online Auctions -- Libel and Lawsuits -- Threats and Harassment -- Software Piracy and Copyright Infringements -- Pornography and Other Lapses in Good Taste -- Hoaxes and Legends -- Personal Safety Online: Above and Beyond -- The No Electronic Theft Act of 1997 -- The Digital Millennium Copyright Act of 1998 -- Plagiarism -- Notice and Consent Policies -- How Cookies Work -- Privacy, Digital Records, and Commercial Interests -- Broadband Risks and Remedies -- Hacking: Phone Phreaks, Hackers, and Script Kiddies -- E-Mail Management -- Taking Charge -- Basic E-Mail Client Operations -- Anatomy of an E-Mail Message -- What to Expect from Your Mail Client -- Viewing Your Inbox -- Viewing Individual Mail Messages -- Sending a New Mail Message -- Signatures -- Importing Text into Messages -- Importance of Good Writing -- Replying To and Forwarding E-Mail Messages -- Mime Attachments and HTML-Enabled Mailers -- The MIME Protocol -- HTML-Enabled Mailers -- E-Mail Netiquette and Netspeak -- Emoticons -- Flames, Flaming, and Flame Wars -- SMTP and Mail Servers -- HTTP, POP, and IMAP -- Hypertext Transfer Protocol -- Post Office Protocol 3 and Internet Message Access Protocol -- Filtering and Routing -- Web-Based Mail Accounts -- E-Mail Management: Above and Beyond -- SPAM: Trouble in Paradise -- How to Fight Back against SPAM -- Managing Multiple E-Mail Accounts -- Conquering Raggy Text -- Uuencoded Mail -- Basic Web Page Construction -- Taking Charge -- Web Page HTML Elements -- What is HTML? -- Editing HTML Files -- Basic Web Page Formatting -- Adding a Heading -- Adding a List -- Working with Fonts and Type Styles -- Basic Web Page Graphics -- Using Color -- Working with Image Files -- Three Types of Hyperlinks -- Absolute URLs -- Relative URLs -- Named Anchors -- Testing Your Hyperlinks -- Page Layouts with Tables -- Creating Borders by Using Tables -- Creating Margins by Using Tables -- Organizing Graphical Elements in Tables -- Navigation Maps with Frames -- Creating a Frame -- A Web Site Construction Checklist -- The Three C's of Web Page Design -- Avoid Common Mistakes -- Check Pages before Installing Them -- Use Effective Web Page Titles -- Keep Download Times Short -- Make Your Pages Portable -- Choose Between State-of-the-Art or Maximal Access -- Installing Web Pages on A Web Server -- Six Steps to Publish a Web Page -- Uploading Your Pages -- Copyright Law and the Web -- Copyright Basics -- What is Protected -- Personal Use of Online Materials -- Publishing on the Web -- Fair Use Guidelines -- Copyright Law in a Digital Era -- Basic Web Page Construction: Above and Beyond -- Graphics and Download Times -- Audio Files for the Web -- Copyright Guidelines for Multimedia Projects -- HTML Editors and Web Page Construction Tools -- How to Increase Your Web Page Hit Counts -- Browser-Specific Extensions and Page Testing -- Advanced Web Page Construction -- Taking Charge -- Client-Side Image Maps -- Step 1: Loading an Image File -- Step 2: Mapping the Hotzones -- Step 3: Installing the Image Map -- Javascript and Mouseover Events -- JAVA Applets -- Data-Driven Web Pages -- Web Site Maintenance Tools -- Link Checkers -- Site Mappers -- Site Construction Kits -- Advanced Web Page Construction: Above and Beyond -- Image Processing Utilities -- CGI Scripts -- How Far Can You Go Without Programming -- Find What You Want -- Fast! -- Taking Charge -- More About Subject Trees and Clearinghouses -- Yahoo! -- About -- Open Directory Project -- Clearinghouses -- General Search Engines and META Search Engines -- Some Ground Rules -- Successive Query Refinement -- Fuzzy Queries -- Using Term Counts -- Boolean Queries -- Advanced Search Options -- Specialized Search Engines -- Search Bots and Intelligent Agents -- Pull and Push Technologies -- Assessing Credibility on the Web -- Author Credibility -- Accurate Writing and Documentation -- Objectivity -- Stability of Web Pages -- Fraudulent Web Pages -- Find What You Want -- Fast!: Above and Beyond -- Information Retrieval Concepts -- Search Engine Web Coverage -- Joining a Virtual Community -- Taking Charge -- Virtual Communities -- Mailing Lists -- Subscribing to Mailing Lists -- Some Great Mailing Lists -- Mailing List Netiquette -- Netspeak -- Web-Based Discussion Groups -- Yahoo! Message Boards -- Creating Your Own Discussion Group -- Usenet Newsgroups -- How Newsgroups Are Organized -- How to Create a Newsgroup -- Usenet Netiquette and Advertising -- How Usenet News Servers Work -- Usenet FAQ Files -- Reading Usenet with a News Reader -- The Three Levels of Usenet -- Posting and Saving Messages -- Keeping Track of Messages -- Subscribing and Unsubscribing -- Adding Signature Files -- Cross-Posting Queries and Messages -- Killing Articles -- Experiment before Your First Post -- Usenet News Readers versus Usenet on the Web -- Locating Mailing Lists and Newsgroups -- Internet Relay Chat, Web-Based Chat, and Instant Messaging -- Internet Relay Chat -- Web-Based Chat -- Instant Messaging -- The Psychology of Chat Rooms -- Joining a Virtual Community: Above and Beyond -- Censorship on the Internet -- Cancelbots and NoCeM -- Privacy Safeguards -- Internet Telephony -- Protecting Children -- Software on the Internet -- Taking Charge -- Trouble-Free Downloads -- Anti-Virus Protection -- Installation Tips -- Executable installers -- Ready-to-Go Executables -- Zipped File Archives -- Self-Extracting Archives -- ActiveX Installers -- File Download Utilities -- Software Clearinghouses -- Some Popular Software Sites -- Windows Software Sites -- Macintosh Software Sites -- FTP Software Archives -- Managing Your Software -- Three Rules for All Computer Users -- Maintenance Tools -- Finding Good Software Reviews -- Software on the Internet: Above and Beyond -- Software Licenses -- Open Source Software -- Trojan Horses -- Power Tools for the Internet -- Taking Charge -- Applications: Helpers, Plug-Ins, and Add-Ons -- Web Accelerators -- Ad Filters -- Download Managers -- Password Managers -- Desktop Portals -- Alternative Web Browsers -- FTP Client Power Features -- File Type Detection and Selection -- File Queues and Thread Counts -- Auto Resume -- Desktop Integration -- Keep Alive -- Customizable Toolbars -- Search and Sort Options -- Bookmarks and Macro Recorders -- Power Tools for the Internet: Above and Beyond -- Cookie Managers -- Firewalls -- Net Monitors -- Telnet Clients -- E-Commerce -- Taking Charge -- Buying Cars -- Buying Books -- Buying Unusual Items -- Shopping for Supplies -- Online Shopping Risks and Safeguards -- Secure Servers and Secure Web Pages -- Commercial Sites and Self-Regulation -- Online Auctions -- Take a Closer Look: Above and Beyond -- E-Commerce, National Security, and Hackers -- Digital Telephony and Convergence -- Internet Appliances -- Encryption and the Internet -- Taking Charge -- Private-Key Encryption -- Public-Key Encryption -- Digital Signatures -- Key Management -- Counterfeit Keys -- Key Certification -- Digital Certificates -- Strong and Weak Encryption -- Encryption and the Internet: Above and Beyond -- Good Privacy (PGP) -- Privacy-Enhanced E-mail -- Fighting Spam with Encryption -- Strong Encryption and the Culture of the Internet -- Strong Encryption and Law Enforcement -- U.S. Export Restrictions -- Making It All Work For You -- Taking Charge -- Traps and Pitfalls -- Telecommuting -- Time-Saving Services -- Staying On Top Of New Developments -- Careers In Information Technology -- Internet Addiction -- The Truth is Out There -- Internet Service Providers -- How Much Does It Charge? -- Is Its Modem Pool Reliable and Adequate for the Customer Base Served? -- How Good Is Its Technical Support Staff? -- Will It Let You Try Its Services Free For A Week? -- Does It Offer Any Extra Services? -- When To Talk To Technical Staff -- HTML Tags and Attributes -- Head, Title, And Body -- Headings -- Presentation Tags -- Informational Tags -- Text Formatting -- Lists -- Graphics -- Hypertext Links -- Frames -- File Types -- Macintosh Files -- PC Files -- UNIX Files -- Proxy Servers -- For Netscape Communicator -- For Internet Explorer.
Summary: Computer basics,the internet,.E mail management.Basic web page contruction.Advanced web page contruction.Power tools for the internet.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Reference Books Reference Books Main Library Reference Reference 004.69 LEH (Browse shelf(Opens below)) Available 008545
Total holds: 0

First Things First --
Taking Charge --
Computer Basics --
The Operating System --
The Central Processing Unit --
Memory --
Units of Memory --
The Bit --
The Byte and Beyond --
Speed and Bottlenecks --
The Internet --
Host Machines and Host Names --
The Client/Server Software Model --
Web-Based Software Hosting --
The World Wide Web and Web Browsers --
How to Get Online --
Browser Tips and Tricks --
Select Your Own Default Home Page --
Use the Find Command --
Use Your History List --
Use Bookmarks --
Add Bookmarks with Care --
Abort a Download if You Get Stuck --
Turn Off Graphics --
Don't Let a "404 Not Found" Stop You Dead --
Avoid Peak Hours --
First Things First: Above and Beyond --
A Little History --
How Fast Are Different Internet Connections? --
How Data Is Sent Over the Internet --
How File Compression Works --
Hypertext: Changing How People Read --
Personal Safety Online --
Taking Charge --
Acceptable Use Policies --
Password Security --
Viruses, Trojans, and Worms --
E-Mail Viruses --
Macro Viruses --
Script Attacks --
Shopping Online --
Protecting Your Privacy --
Internet Scams --
Online Auctions --
Libel and Lawsuits --
Threats and Harassment --
Software Piracy and Copyright Infringements --
Pornography and Other Lapses in Good Taste --
Hoaxes and Legends --
Personal Safety Online: Above and Beyond --
The No Electronic Theft Act of 1997 --
The Digital Millennium Copyright Act of 1998 --
Plagiarism --
Notice and Consent Policies --
How Cookies Work --
Privacy, Digital Records, and Commercial Interests --
Broadband Risks and Remedies --
Hacking: Phone Phreaks, Hackers, and Script Kiddies --
E-Mail Management --
Taking Charge --
Basic E-Mail Client Operations --
Anatomy of an E-Mail Message --
What to Expect from Your Mail Client --
Viewing Your Inbox --
Viewing Individual Mail Messages --
Sending a New Mail Message --
Signatures --
Importing Text into Messages --
Importance of Good Writing --
Replying To and Forwarding E-Mail Messages --
Mime Attachments and HTML-Enabled Mailers --
The MIME Protocol --
HTML-Enabled Mailers --
E-Mail Netiquette and Netspeak --
Emoticons --
Flames, Flaming, and Flame Wars --
SMTP and Mail Servers --
HTTP, POP, and IMAP --
Hypertext Transfer Protocol --
Post Office Protocol 3 and Internet Message Access Protocol --
Filtering and Routing --
Web-Based Mail Accounts --
E-Mail Management: Above and Beyond --
SPAM: Trouble in Paradise --
How to Fight Back against SPAM --
Managing Multiple E-Mail Accounts --
Conquering Raggy Text --
Uuencoded Mail --
Basic Web Page Construction --
Taking Charge --
Web Page HTML Elements --
What is HTML? --
Editing HTML Files --
Basic Web Page Formatting --
Adding a Heading --
Adding a List --
Working with Fonts and Type Styles --
Basic Web Page Graphics --
Using Color --
Working with Image Files --
Three Types of Hyperlinks --
Absolute URLs --
Relative URLs --
Named Anchors --
Testing Your Hyperlinks --
Page Layouts with Tables --
Creating Borders by Using Tables --
Creating Margins by Using Tables --
Organizing Graphical Elements in Tables --
Navigation Maps with Frames --
Creating a Frame --
A Web Site Construction Checklist --
The Three C's of Web Page Design --
Avoid Common Mistakes --
Check Pages before Installing Them --
Use Effective Web Page Titles --
Keep Download Times Short --
Make Your Pages Portable --
Choose Between State-of-the-Art or Maximal Access --
Installing Web Pages on A Web Server --
Six Steps to Publish a Web Page --
Uploading Your Pages --
Copyright Law and the Web --
Copyright Basics --
What is Protected --
Personal Use of Online Materials --
Publishing on the Web --
Fair Use Guidelines --
Copyright Law in a Digital Era --
Basic Web Page Construction: Above and Beyond --
Graphics and Download Times --
Audio Files for the Web --
Copyright Guidelines for Multimedia Projects --
HTML Editors and Web Page Construction Tools --
How to Increase Your Web Page Hit Counts --
Browser-Specific Extensions and Page Testing --
Advanced Web Page Construction --
Taking Charge --
Client-Side Image Maps --
Step 1: Loading an Image File --
Step 2: Mapping the Hotzones --
Step 3: Installing the Image Map --
Javascript and Mouseover Events --
JAVA Applets --
Data-Driven Web Pages --
Web Site Maintenance Tools --
Link Checkers --
Site Mappers --
Site Construction Kits --
Advanced Web Page Construction: Above and Beyond --
Image Processing Utilities --
CGI Scripts --
How Far Can You Go Without Programming --
Find What You Want --
Fast! --
Taking Charge --
More About Subject Trees and Clearinghouses --
Yahoo! --
About --
Open Directory Project --
Clearinghouses --
General Search Engines and META Search Engines --
Some Ground Rules --
Successive Query Refinement --
Fuzzy Queries --
Using Term Counts --
Boolean Queries --
Advanced Search Options --
Specialized Search Engines --
Search Bots and Intelligent Agents --
Pull and Push Technologies --
Assessing Credibility on the Web --
Author Credibility --
Accurate Writing and Documentation --
Objectivity --
Stability of Web Pages --
Fraudulent Web Pages --
Find What You Want --
Fast!: Above and Beyond --
Information Retrieval Concepts --
Search Engine Web Coverage --
Joining a Virtual Community --
Taking Charge --
Virtual Communities --
Mailing Lists --
Subscribing to Mailing Lists --
Some Great Mailing Lists --
Mailing List Netiquette --
Netspeak --
Web-Based Discussion Groups --
Yahoo! Message Boards --
Creating Your Own Discussion Group --
Usenet Newsgroups --
How Newsgroups Are Organized --
How to Create a Newsgroup --
Usenet Netiquette and Advertising --
How Usenet News Servers Work --
Usenet FAQ Files --
Reading Usenet with a News Reader --
The Three Levels of Usenet --
Posting and Saving Messages --
Keeping Track of Messages --
Subscribing and Unsubscribing --
Adding Signature Files --
Cross-Posting Queries and Messages --
Killing Articles --
Experiment before Your First Post --
Usenet News Readers versus Usenet on the Web --
Locating Mailing Lists and Newsgroups --
Internet Relay Chat, Web-Based Chat, and Instant Messaging --
Internet Relay Chat --
Web-Based Chat --
Instant Messaging --
The Psychology of Chat Rooms --
Joining a Virtual Community: Above and Beyond --
Censorship on the Internet --
Cancelbots and NoCeM --
Privacy Safeguards --
Internet Telephony --
Protecting Children --
Software on the Internet --
Taking Charge --
Trouble-Free Downloads --
Anti-Virus Protection --
Installation Tips --
Executable installers --
Ready-to-Go Executables --
Zipped File Archives --
Self-Extracting Archives --
ActiveX Installers --
File Download Utilities --
Software Clearinghouses --
Some Popular Software Sites --
Windows Software Sites --
Macintosh Software Sites --
FTP Software Archives --
Managing Your Software --
Three Rules for All Computer Users --
Maintenance Tools --
Finding Good Software Reviews --
Software on the Internet: Above and Beyond --
Software Licenses --
Open Source Software --
Trojan Horses --
Power Tools for the Internet --
Taking Charge --
Applications: Helpers, Plug-Ins, and Add-Ons --
Web Accelerators --
Ad Filters --
Download Managers --
Password Managers --
Desktop Portals --
Alternative Web Browsers --
FTP Client Power Features --
File Type Detection and Selection --
File Queues and Thread Counts --
Auto Resume --
Desktop Integration --
Keep Alive --
Customizable Toolbars --
Search and Sort Options --
Bookmarks and Macro Recorders --
Power Tools for the Internet: Above and Beyond --
Cookie Managers --
Firewalls --
Net Monitors --
Telnet Clients --
E-Commerce --
Taking Charge --
Buying Cars --
Buying Books --
Buying Unusual Items --
Shopping for Supplies --
Online Shopping Risks and Safeguards --
Secure Servers and Secure Web Pages --
Commercial Sites and Self-Regulation --
Online Auctions --
Take a Closer Look: Above and Beyond --
E-Commerce, National Security, and Hackers --
Digital Telephony and Convergence --
Internet Appliances --
Encryption and the Internet --
Taking Charge --
Private-Key Encryption --
Public-Key Encryption --
Digital Signatures --
Key Management --
Counterfeit Keys --
Key Certification --
Digital Certificates --
Strong and Weak Encryption --
Encryption and the Internet: Above and Beyond --
Good Privacy (PGP) --
Privacy-Enhanced E-mail --
Fighting Spam with Encryption --
Strong Encryption and the Culture of the Internet --
Strong Encryption and Law Enforcement --
U.S. Export Restrictions --
Making It All Work For You --
Taking Charge --
Traps and Pitfalls --
Telecommuting --
Time-Saving Services --
Staying On Top Of New Developments --
Careers In Information Technology --
Internet Addiction --
The Truth is Out There --
Internet Service Providers --
How Much Does It Charge? --
Is Its Modem Pool Reliable and Adequate for the Customer Base Served? --
How Good Is Its Technical Support Staff? --
Will It Let You Try Its Services Free For A Week? --
Does It Offer Any Extra Services? --
When To Talk To Technical Staff --
HTML Tags and Attributes --
Head, Title, And Body --
Headings --
Presentation Tags --
Informational Tags --
Text Formatting --
Lists --
Graphics --
Hypertext Links --
Frames --
File Types --
Macintosh Files --
PC Files --
UNIX Files --
Proxy Servers --
For Netscape Communicator --
For Internet Explorer.

Computer basics,the internet,.E mail management.Basic web page contruction.Advanced web page contruction.Power tools for the internet.

There are no comments on this title.

to post a comment.

© University of Vavuniya

------