Record ID | marc_loc_2016/BooksAll.2016.part41.utf8:180686899:2668 |
Source | Library of Congress |
Download Link | /show-records/marc_loc_2016/BooksAll.2016.part41.utf8:180686899:2668?format=raw |
LEADER: 02668cam a22003858i 4500
001 2014027221
003 DLC
005 20151203080730.0
008 140811s2014 ctu b 001 0 eng
010 $a 2014027221
020 $a9781493005697 (paperback)
040 $aDLC$beng$cDLC$erda
042 $apcc
050 00 $aHV6773$b.M66 2014
082 00 $a613.60285/4678$223
084 $aCOM060040$aREF015000$aSEL000000$2bisacsh
100 1 $aMoore, Alexis,$d1951-
245 10 $aCyber self-defense :$bexpert advice to avoid online predators, identity theft, and cyberbullying /$cAlexis Moore and Laurie J. Edwards.
263 $a1411
264 1 $aGuilford, Connecticut :$bLyons Press,$c2014.
300 $apages cm
336 $atext$2rdacontent
337 $aunmediated$2rdamedia
338 $avolume$2rdacarrier
520 $a" According to the U.S.Department of Justice, more than six million people are stalked each year in the United States alone. Don't become one of them! International cybercrime expert Alexis Moore can help protect you from the spurned lovers, angry neighbors, and jealous coworkers who use the Internet as the perfect way to exact revenge and wreak havoc on your life. In her essential book, she introduces the ten most common personality profiles of cyberstalkers--such as Attention-Getting, Jealous, Manipulative, Controlling, and Narcissistic--and their threatening online behaviors. Each chapter includes a quiz to help you identify the signs of that personality type in order to determine if you are in a potentially vulnerable relationship. Case studies illustrate how that particular cybercriminal operates, and Moore offers tips to prevent and/or recover from each type of cybercrime. She also provides strategies to help victims protect themselves, reestablish their reputations and credentials, recover from financial losses, and rebuild their lives. The techniques range from recovering data, monitoring online profiles and social media information, and regaining self-esteem to changing identities and even going underground. "--$cProvided by publisher.
520 $a"Explains how to identify potential cyberattackers and how to recover from a cybercrime if you've been attacked"--$cProvided by publisher.
504 $aIncludes bibliographical references and index.
650 0 $aInternet$xSafety measures.
650 0 $aComputer security.
650 0 $aCyberbullying.
650 0 $aOnline identity theft$xPrevention.
650 7 $aCOMPUTERS / Internet / Security.$2bisacsh
650 7 $aREFERENCE / Personal & Practical Guides.$2bisacsh
650 7 $aSELF-HELP / General.$2bisacsh
700 1 $aEdwards, Laurie J.