Web 101 : making the Net work for you
Material type: TextPublication details: Boston : Addison-Wesley, ©2001.Description: xxxi, 736 p. : illustrationsISBN:- 0201704749
- 9780201704747
- 817808242X
- 9788178082424
- 004.69 LEH
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|
Reference Books | Main Library Reference | Reference | 004.69 LEH (Browse shelf(Opens below)) | Available | 008545 |
Browsing Main Library shelves, Shelving location: Reference, Collection: Reference Close shelf browser (Hides shelf browser)
004.69 INS Inside Windows NT Server 4. | 004.69 JON Microsoft.Net e-commerce bible | 004.69 KUR Computer Networking : A Top-Down Approach Featuring the Internet | 004.69 LEH Web 101 : making the Net work for you | 004.69 LEO Communication networks : fundamental concepts and key architectures | 004.69 LEV The Internet for dummies | 004.69 MAS Mastering Windows 2000 Server |
First Things First --
Taking Charge --
Computer Basics --
The Operating System --
The Central Processing Unit --
Memory --
Units of Memory --
The Bit --
The Byte and Beyond --
Speed and Bottlenecks --
The Internet --
Host Machines and Host Names --
The Client/Server Software Model --
Web-Based Software Hosting --
The World Wide Web and Web Browsers --
How to Get Online --
Browser Tips and Tricks --
Select Your Own Default Home Page --
Use the Find Command --
Use Your History List --
Use Bookmarks --
Add Bookmarks with Care --
Abort a Download if You Get Stuck --
Turn Off Graphics --
Don't Let a "404 Not Found" Stop You Dead --
Avoid Peak Hours --
First Things First: Above and Beyond --
A Little History --
How Fast Are Different Internet Connections? --
How Data Is Sent Over the Internet --
How File Compression Works --
Hypertext: Changing How People Read --
Personal Safety Online --
Taking Charge --
Acceptable Use Policies --
Password Security --
Viruses, Trojans, and Worms --
E-Mail Viruses --
Macro Viruses --
Script Attacks --
Shopping Online --
Protecting Your Privacy --
Internet Scams --
Online Auctions --
Libel and Lawsuits --
Threats and Harassment --
Software Piracy and Copyright Infringements --
Pornography and Other Lapses in Good Taste --
Hoaxes and Legends --
Personal Safety Online: Above and Beyond --
The No Electronic Theft Act of 1997 --
The Digital Millennium Copyright Act of 1998 --
Plagiarism --
Notice and Consent Policies --
How Cookies Work --
Privacy, Digital Records, and Commercial Interests --
Broadband Risks and Remedies --
Hacking: Phone Phreaks, Hackers, and Script Kiddies --
E-Mail Management --
Taking Charge --
Basic E-Mail Client Operations --
Anatomy of an E-Mail Message --
What to Expect from Your Mail Client --
Viewing Your Inbox --
Viewing Individual Mail Messages --
Sending a New Mail Message --
Signatures --
Importing Text into Messages --
Importance of Good Writing --
Replying To and Forwarding E-Mail Messages --
Mime Attachments and HTML-Enabled Mailers --
The MIME Protocol --
HTML-Enabled Mailers --
E-Mail Netiquette and Netspeak --
Emoticons --
Flames, Flaming, and Flame Wars --
SMTP and Mail Servers --
HTTP, POP, and IMAP --
Hypertext Transfer Protocol --
Post Office Protocol 3 and Internet Message Access Protocol --
Filtering and Routing --
Web-Based Mail Accounts --
E-Mail Management: Above and Beyond --
SPAM: Trouble in Paradise --
How to Fight Back against SPAM --
Managing Multiple E-Mail Accounts --
Conquering Raggy Text --
Uuencoded Mail --
Basic Web Page Construction --
Taking Charge --
Web Page HTML Elements --
What is HTML? --
Editing HTML Files --
Basic Web Page Formatting --
Adding a Heading --
Adding a List --
Working with Fonts and Type Styles --
Basic Web Page Graphics --
Using Color --
Working with Image Files --
Three Types of Hyperlinks --
Absolute URLs --
Relative URLs --
Named Anchors --
Testing Your Hyperlinks --
Page Layouts with Tables --
Creating Borders by Using Tables --
Creating Margins by Using Tables --
Organizing Graphical Elements in Tables --
Navigation Maps with Frames --
Creating a Frame --
A Web Site Construction Checklist --
The Three C's of Web Page Design --
Avoid Common Mistakes --
Check Pages before Installing Them --
Use Effective Web Page Titles --
Keep Download Times Short --
Make Your Pages Portable --
Choose Between State-of-the-Art or Maximal Access --
Installing Web Pages on A Web Server --
Six Steps to Publish a Web Page --
Uploading Your Pages --
Copyright Law and the Web --
Copyright Basics --
What is Protected --
Personal Use of Online Materials --
Publishing on the Web --
Fair Use Guidelines --
Copyright Law in a Digital Era --
Basic Web Page Construction: Above and Beyond --
Graphics and Download Times --
Audio Files for the Web --
Copyright Guidelines for Multimedia Projects --
HTML Editors and Web Page Construction Tools --
How to Increase Your Web Page Hit Counts --
Browser-Specific Extensions and Page Testing --
Advanced Web Page Construction --
Taking Charge --
Client-Side Image Maps --
Step 1: Loading an Image File --
Step 2: Mapping the Hotzones --
Step 3: Installing the Image Map --
Javascript and Mouseover Events --
JAVA Applets --
Data-Driven Web Pages --
Web Site Maintenance Tools --
Link Checkers --
Site Mappers --
Site Construction Kits --
Advanced Web Page Construction: Above and Beyond --
Image Processing Utilities --
CGI Scripts --
How Far Can You Go Without Programming --
Find What You Want --
Fast! --
Taking Charge --
More About Subject Trees and Clearinghouses --
Yahoo! --
About --
Open Directory Project --
Clearinghouses --
General Search Engines and META Search Engines --
Some Ground Rules --
Successive Query Refinement --
Fuzzy Queries --
Using Term Counts --
Boolean Queries --
Advanced Search Options --
Specialized Search Engines --
Search Bots and Intelligent Agents --
Pull and Push Technologies --
Assessing Credibility on the Web --
Author Credibility --
Accurate Writing and Documentation --
Objectivity --
Stability of Web Pages --
Fraudulent Web Pages --
Find What You Want --
Fast!: Above and Beyond --
Information Retrieval Concepts --
Search Engine Web Coverage --
Joining a Virtual Community --
Taking Charge --
Virtual Communities --
Mailing Lists --
Subscribing to Mailing Lists --
Some Great Mailing Lists --
Mailing List Netiquette --
Netspeak --
Web-Based Discussion Groups --
Yahoo! Message Boards --
Creating Your Own Discussion Group --
Usenet Newsgroups --
How Newsgroups Are Organized --
How to Create a Newsgroup --
Usenet Netiquette and Advertising --
How Usenet News Servers Work --
Usenet FAQ Files --
Reading Usenet with a News Reader --
The Three Levels of Usenet --
Posting and Saving Messages --
Keeping Track of Messages --
Subscribing and Unsubscribing --
Adding Signature Files --
Cross-Posting Queries and Messages --
Killing Articles --
Experiment before Your First Post --
Usenet News Readers versus Usenet on the Web --
Locating Mailing Lists and Newsgroups --
Internet Relay Chat, Web-Based Chat, and Instant Messaging --
Internet Relay Chat --
Web-Based Chat --
Instant Messaging --
The Psychology of Chat Rooms --
Joining a Virtual Community: Above and Beyond --
Censorship on the Internet --
Cancelbots and NoCeM --
Privacy Safeguards --
Internet Telephony --
Protecting Children --
Software on the Internet --
Taking Charge --
Trouble-Free Downloads --
Anti-Virus Protection --
Installation Tips --
Executable installers --
Ready-to-Go Executables --
Zipped File Archives --
Self-Extracting Archives --
ActiveX Installers --
File Download Utilities --
Software Clearinghouses --
Some Popular Software Sites --
Windows Software Sites --
Macintosh Software Sites --
FTP Software Archives --
Managing Your Software --
Three Rules for All Computer Users --
Maintenance Tools --
Finding Good Software Reviews --
Software on the Internet: Above and Beyond --
Software Licenses --
Open Source Software --
Trojan Horses --
Power Tools for the Internet --
Taking Charge --
Applications: Helpers, Plug-Ins, and Add-Ons --
Web Accelerators --
Ad Filters --
Download Managers --
Password Managers --
Desktop Portals --
Alternative Web Browsers --
FTP Client Power Features --
File Type Detection and Selection --
File Queues and Thread Counts --
Auto Resume --
Desktop Integration --
Keep Alive --
Customizable Toolbars --
Search and Sort Options --
Bookmarks and Macro Recorders --
Power Tools for the Internet: Above and Beyond --
Cookie Managers --
Firewalls --
Net Monitors --
Telnet Clients --
E-Commerce --
Taking Charge --
Buying Cars --
Buying Books --
Buying Unusual Items --
Shopping for Supplies --
Online Shopping Risks and Safeguards --
Secure Servers and Secure Web Pages --
Commercial Sites and Self-Regulation --
Online Auctions --
Take a Closer Look: Above and Beyond --
E-Commerce, National Security, and Hackers --
Digital Telephony and Convergence --
Internet Appliances --
Encryption and the Internet --
Taking Charge --
Private-Key Encryption --
Public-Key Encryption --
Digital Signatures --
Key Management --
Counterfeit Keys --
Key Certification --
Digital Certificates --
Strong and Weak Encryption --
Encryption and the Internet: Above and Beyond --
Good Privacy (PGP) --
Privacy-Enhanced E-mail --
Fighting Spam with Encryption --
Strong Encryption and the Culture of the Internet --
Strong Encryption and Law Enforcement --
U.S. Export Restrictions --
Making It All Work For You --
Taking Charge --
Traps and Pitfalls --
Telecommuting --
Time-Saving Services --
Staying On Top Of New Developments --
Careers In Information Technology --
Internet Addiction --
The Truth is Out There --
Internet Service Providers --
How Much Does It Charge? --
Is Its Modem Pool Reliable and Adequate for the Customer Base Served? --
How Good Is Its Technical Support Staff? --
Will It Let You Try Its Services Free For A Week? --
Does It Offer Any Extra Services? --
When To Talk To Technical Staff --
HTML Tags and Attributes --
Head, Title, And Body --
Headings --
Presentation Tags --
Informational Tags --
Text Formatting --
Lists --
Graphics --
Hypertext Links --
Frames --
File Types --
Macintosh Files --
PC Files --
UNIX Files --
Proxy Servers --
For Netscape Communicator --
For Internet Explorer.
Computer basics,the internet,.E mail management.Basic web page contruction.Advanced web page contruction.Power tools for the internet.
There are no comments on this title.