Web 101 : Making the Net Work for You / Edition 1

Web 101 : Making the Net Work for You / Edition 1

by Wendy G. Lehnert
     
 

ISBN-10: 0201704749

ISBN-13: 9780201704747

Pub. Date: 10/30/2000

Publisher: Pearson Education

B> This book presents a completely new and innovative approach to the Web that is tailored to individual users' needs, as opposed to simply studying tools that are used on the Web. It is designed around important issues that all users of the World Wide Web need to know to take full advantage of its power. Upon using this book, readers will be familiar

Overview

B> This book presents a completely new and innovative approach to the Web that is tailored to individual users' needs, as opposed to simply studying tools that are used on the Web. It is designed around important issues that all users of the World Wide Web need to know to take full advantage of its power. Upon using this book, readers will be familiar with: protecting themselves on the Internet by studying potential consequences, including legal ramifications and technical and personal complications; selecting the mail software that best suits their needs, and then using the best options and techniques for managing the vast amounts of mail that will follow; how to quickly and accurately access the best information on the Internet through effective search techniques; determining the value of Virtual Communities on the Web, and mastering the software options that are of value when a part of Virtual Communities (i.e. mail digests, listerv commands, Usenet display options, and kill files); creating Web Pages, both with a minimal knowledge of HTML in combination with key tools, or with HTML and JavaScript, in order to create good-looking Web pages; how to locate software worth having, and how to safely download and install software while protecting themselves from computer viruses, as well as understanding the most commonly used file formats, file utilities, file archives, self-extracting files, installers, and uninstallers; how to make their browser take full advantage of multimedia Web sites, including use of audio and video files, creating a music library, burning their own music CDs, putting photos and sounds on their Web pages, and expanding their bandwidth withoutshrinking their wallets; how to make the most out of e-commerce, including comparison shopping, safe use of credit cards online, protecting themselves in an online auction, and the privacy trade-offs and prospective pitfalls of shopping in the online world; how to encrypt their online communication to ensure privacy; and how to coordinate their Internet access from multiple points-of-access, including Telnet and FTP. This book is right for anyone who wants enhance their Web experience, from novice surfers to experienced programmers.

Product Details

ISBN-13:
9780201704747
Publisher:
Pearson Education
Publication date:
10/30/2000
Edition description:
Older Edition
Pages:
736
Product dimensions:
7.99(w) x 9.13(h) x 3.64(d)

Table of Contents

First Things First
1(51)
Taking Charge
1(2)
Computer Basics
3(3)
The Operating System
3(1)
The Central Processing Unit
4(1)
Memory
5(1)
Units of Memory
6(6)
The Bit
7(1)
The Byte and Beyond
8(4)
Speed and Bottlenecks
12(3)
The Internet
15(3)
Host Machines and Host Names
18(2)
The Client/Server Software Model
20(3)
Web-Based Software Hosting
22(1)
The World Wide Web and Web Browsers
23(2)
How to Get Online
25(1)
Browser Tips and Tricks
26(11)
Select Your Own Default Home Page
27(1)
Use the Find Command
27(1)
Use Your History List
28(1)
Use Bookmarks
28(1)
Add Bookmarks with Care
29(1)
Abort a Download if You Get Stuck
30(1)
Turn Off Graphics
30(1)
Don't Let a "404 Not Found" Stop You Dead
31(1)
Avoid Peak Hours
32(1)
Things to Remember
32(1)
Important Concepts
33(1)
Where Can I Learn More?
34(1)
Problems and Exercises
34(3)
First Things First: Above and Beyond
37(14)
A Little History
37(2)
How Fast Are Different Internet Connections?
39(3)
How Data Is Sent Over the Internet
42(4)
How File Compression Works
46(1)
Hypertext: Changing How People Read
47(1)
Above and Beyond: Problems and Exercises
48(3)
Personal Safety Online
51(56)
Taking Charge
51(1)
Acceptable Use Policies
52(1)
Password Security
53(2)
Viruses, Trojans, and Worms
55(6)
E-Mail Viruses
61(8)
Macro Viruses
62(6)
Script Attacks
68(1)
Shopping Online
69(3)
Protecting Your Privacy
72(1)
Internet Scams
73(1)
Online Auctions
74(3)
Libel and Lawsuits
77(1)
Threats and Harassment
78(2)
Software Piracy and Copyright Infringements
80(3)
Pornography and Other Lapses in Good Taste
83(1)
Hoaxes and Legends
84(5)
Things to Remember
85(1)
Important Concepts
86(1)
Where Can I Learn More?
86(1)
Problems and Exercises
87(2)
Personal Safety Online: Above and Beyond
89(18)
The No Electronic Theft Act of 1997
89(1)
The Digital Millennium Copyright Act of 1998
90(1)
Plagiarism
91(1)
Notice and Consent Policies
91(1)
How Cookies Work
92(2)
Privacy, Digital Records, and Commercial Interests
94(3)
Broadband Risks and Remedies
97(2)
Hacking: Phone Phreaks, Hackers, and Script Kiddies
99(6)
Above and Beyond: Problems and Exercises
105(2)
E-Mail Management
107(50)
Taking Charge
107(1)
Basic E-Mail Client Operations
108(14)
Anatomy of an E-Mail Message
109(3)
What to Expect from Your Mail Client
112(2)
Viewing Your Inbox
114(1)
Viewing Individual Mail Messages
115(1)
Sending a New Mail Message
116(1)
Signatures
117(2)
Importing Text into Messages
119(1)
Importance of Good Writing
119(1)
Replying To and Forwarding E-Mail Messages
120(2)
Mime Attachments and HTML-Enabled Mailers
122(5)
The MIME Protocol
122(2)
HTML-Enabled Mailers
124(3)
E-Mail Netiquette and Netspeak
127(1)
Emoticons
127(1)
Flames, Flaming, and Flame Wars
128(1)
SMTP and Mail Servers
128(1)
HTTP, POP, and IMAP
129(6)
Hypertext Transfer Protocol
130(1)
Post Office Protocol 3 and Internet Mesage Access Protocol
131(4)
Filtering and Routing
135(2)
Web-Based Mail Accounts
137(7)
Things to Remember
141(1)
Important Concepts
141(1)
Where Can I Learn More?
141(1)
Problems and Exercises
142(2)
E-Mail Management: Above and Beyond
144(13)
SPAM: Trouble in Paradise
144(2)
How to Fight Back against SPAM
146(4)
Managing Multiple E-Mail Accounts
150(2)
Conquering Raggy Text
152(1)
Uuencoded Mail
153(2)
Above and Beyond Problems and Exercises
155(2)
Basic Web Page Construction
157(82)
Taking Charge
157(1)
Web Page HTML Elements
158(6)
What is HTML?
160(2)
Editing HTML Files
162(2)
Basic Web Page Formatting
164(8)
Adding a Heading
165(4)
Adding a List
169(1)
Working with Fonts and Type Styles
170(2)
Basic Web Page Graphics
172(12)
Using Color
172(1)
Working with Image Files
173(11)
Three Types of Hyperlinks
184(5)
Absolute URLs
184(2)
Relative URLs
186(1)
Named Anchors
187(1)
Testing Your Hyperlinks
188(1)
Page Layouts with Tables
189(10)
Creating Borders by Using Tables
190(3)
Creating Margins by Using Tables
193(2)
Organizing Graphical Elements in Tables
195(4)
Navigation Maps with Frames
199(3)
Creating a Frame
200(2)
A Web Site Construction Checklist
202(3)
The Three C's of Web Page Design
202(1)
Avoid Common Mistakes
202(1)
Check Pages before Installing Them
203(1)
Use Effective Web Page Titles
203(1)
Keep Download Times Short
204(1)
Make Your Pages Portable
204(1)
Choose Between State-of-the-Art or Maximal Access
204(1)
Installing Web Pages on A Web Server
205(4)
Six Steps to Publish a Web Page
205(1)
Uploading Your Pages
206(3)
Copyright Law and the Web
209(12)
Copyright Basics
210(1)
What is Protected
211(1)
Personal Use of Online Materials
212(1)
Publishing on the Web
212(2)
Fair Use Guidelines
214(2)
Copyright Law in a Digital Era
216(2)
Things to Remember
218(1)
Important Concepts
218(1)
Where Can I Learn More?
218(1)
Problems and Exercises
219(2)
Basic Web Page Construction: Above and Beyond
221(18)
Graphics and Download Times
221(2)
Audio Files for the Web
223(1)
Copyright Guidelines for Multimedia Projects
224(3)
HTML Editors and Web Page Construction Tools
227(1)
How to Increase Your Web Page Hit Counts
228(4)
Browser-Specific Extensions and Page Testing
232(4)
Above and Beyond: Problems and Exercises
236(3)
Advanced Web Page Construction
239(68)
Taking charge
239(3)
Client-Side Image Maps
242(9)
Step 1: Loading an Image File
245(2)
Step 2: Mapping the Hotzones
247(3)
Step 3: Installing the Image Map
250(1)
Javascript and Mouseover Events
251(13)
JAVA Applets
264(6)
Data-Driven Web Pages
270(5)
Web Site Maintenance Tools
275(4)
Link Checkers
275(2)
Site Mappers
277(2)
Site Construction Kits
279(8)
Things to Remember
282(1)
Important Concepts
282(1)
Where Can I Learn More?
282(1)
Problems and Exercises
283(4)
Advanced Web Page Construction: Above and Beyond
287(20)
Image Processing Utilities
287(6)
CGI Scripts
293(7)
How Far Can You Go Without Programming
300(4)
Above and Beyond: Problems and Exercises
304(3)
Find What You Want---Fast!
307(72)
Taking Charge
307(5)
More About Subject Trees and Clearinghouses
312(15)
Yahoo!
312(8)
About
320(1)
Open Directory Project
320(1)
Clearinghouses
321(6)
General Search Engines and META Search Engines
327(11)
Some Ground Rules
327(2)
Getting Started
329(9)
Successive Query Refinement
338(8)
Fuzzy Queries
339(3)
Using Term Counts
342(2)
Boolean Queries
344(2)
Advanced Search Options
346(2)
Specialized Search Engines
348(4)
Search Bots and Intelligent Agents
352(1)
Pull and Push Technologies
353(6)
Assessing Credibility on the Web
359(8)
Author Credibility
360(1)
Accurate Writing and Documentation
361(1)
Objectivity
361(1)
Stability of Web Pages
362(1)
Fraudulent Web Pages
362(1)
Things to Remember
363(1)
Important Concepts
363(1)
Where Can I Learn More?
363(1)
Problems and Exercises
364(3)
Find What You Want---Fast!: Above and Beyond
367(12)
Information Retrieval Concepts
367(6)
Search Engine Web Coverage
373(1)
Above and Beyond: Problems and Exercises
373(6)
Joining a Virtual Community
379(78)
Taking Charge
379(3)
Virtual Communities
380(2)
Mailing Lists
382(8)
Subscribing to Mailing Lists
384(3)
Some Great Mailing Lists
387(1)
Mailing List Netiquette
387(2)
Netspeak
389(1)
Web-Based Discussion Groups
390(7)
Yahoo! Message Boards
391(3)
Creating Your Own Discussion Group
394(3)
Usenet Newsgroups
397(10)
How Newsgroups Are Organized
398(4)
How to Create a Newsgroups
402(1)
Usenet Netiquette and Advertising
402(1)
How Usenet News Servers Work
403(1)
Usenet FAQ Files
404(3)
Reading Usenet with a News Reader
407(14)
The Three Levels of Usenet
409(5)
Positing and Saving Messages
414(2)
Keeping Track of Messages
416(1)
Subscribing and Unsubscribing
416(2)
Adding Signature Files
418(1)
Cross-Posting Queries and Messages
418(1)
Killing Articles
419(1)
Experiment before Your First Post
419(1)
Usenet News Readers versus Usenet on the Web
420(1)
Locating Mailing Lists and Newsgroups
421(5)
Internet Relay Chat, Web-Based Chat, and Instant Messaging
426(12)
Internet Relay Chat
426(3)
Web-Based Chat
429(3)
Instant Messaging
432(6)
The Psychology of Chat Rooms
438(7)
Things to Remember
441(1)
Important Concepts
442(1)
Where Can I Learn More?
442(1)
Problems and Exercises
443(2)
Joining a Virtual Community: Above and Beyond
445(12)
Censorship on the Internet
445(1)
Cancelbots and NoCeM
446(1)
Privacy Safeguards
447(2)
Internet Telephony
449(3)
Protecting Children
452(2)
Above and Beyond: Problems and Exercises
454(3)
Software on the Internet
457(66)
Taking Charge
457(4)
Trouble-Free Downloads
461(6)
Anti-Virus Protection
467(3)
Installation Tips
470(14)
Executable installers
471(5)
Ready-to-Go Executables
476(1)
Zipped File Archives
477(2)
Self-Extracting Archives
479(1)
ActiveX Installers
479(5)
File Download Utilities
484(1)
Software Clearinghouses
485(3)
Some Popular Software Sites
485(1)
Windows Software Sites
486(1)
Macintosh Software Sites
487(1)
FTP Software Archives
488(10)
Managing Your Software
498(5)
Three Rules for All Computer Users
499(3)
Maintenance Tools
502(1)
Finding Good Software Reviews
503(8)
Things to Remember
505(1)
Important Concepts
505(1)
Where Can I Learn More?
506(1)
Problems and Exercises
506(5)
Software on the Internet: Above and Beyond
511(12)
Software Licenses
511(3)
Open Source Software
514(3)
Trojan Horses
517(3)
Above and Beyond: Problems and Exercises
520(3)
Power Tools for the Internet
523(62)
Taking Charge
523(4)
Applications: Helpers, Plug-Ins, and Add-Ons
527(9)
Web Accelerators
536(4)
Ad Filters
540(8)
Download Managers
548(4)
Password Managers
552(3)
Desktop Portals
555(4)
Alternative Web Browsers
559(4)
FTP Client Power Features
563(6)
File Type Detection and Selection
563(1)
File Queues and Thread Counts
563(1)
Auto Resume
563(1)
Desktop Integration
563(1)
Keep Alive
564(1)
Customizable Toolbars
564(1)
Search and Sort Options
564(1)
Bookmarks and Macro Recorders
564(1)
Things to Remember
565(1)
Important Concepts
566(1)
Where Can I Learn More?
566(1)
Problems and Exercises
566(3)
Power Tools for the Internet: Above and Beyond
569(16)
Cookies Managers
569(7)
Firewalls
576(3)
Net Monitors
579(1)
Telnet Clients
579(4)
Above and Beyond: Problems and Exercises
583(2)
E-Commerce
585(38)
Taking Charge
585(4)
Buying Cars
586(1)
Buying Books
586(1)
Buying Unusual Items
587(1)
Shopping for Supplies
587(2)
Online Shopping Risks and Safeguards
589(9)
Secure Servers and Secure Web Pages
598(6)
Commercial Sites and Self-Regulation
604(2)
Online Auctions
606(6)
Things to Remember
609(1)
Important Concepts
609(1)
Where Can I Learn More?
610(1)
Problems and Exercises
610(2)
Take a Closer Look: Above and Beyond
612(11)
E-Commerce, National Security, and Hackers
612(7)
Digital Telephony and Convergence
619(2)
Internet Appliances
621(1)
Above and Beyond: Problems and Exercises
622(1)
Encryption and the Internet
623(52)
Taking Charge
623(2)
Private-Key Encryption
625(3)
Public-Key Encryption
628(2)
Digital Signatures
630(6)
Key Management
636(1)
Counterfeit Keys
637(4)
Key Certification
641(5)
Digital Certificates
646(3)
Strong and Weak Encryption
649(5)
Things to Remember
650(1)
Important Concepts
651(1)
Where Can I Learn More?
651(1)
Problems and Exercises
652(2)
Encryption and the Internet: Above and Beyond
654(21)
Good Privacy (PGP)
654(11)
Privacy-Enhanced E-mail
665(1)
Fighting Spam with Encryption
666(3)
Strong Encryption and the Culture of the Internet
669(1)
Strong Encryption and Law Enforcement
670(2)
U.S. Export Restrictions
672(2)
Above and Beyond: Problems and Exercises
674(1)
Making It All Work For You
675(12)
Taking Charge
675(1)
Traps and Pitfalls
676(2)
Telecommuting
678(2)
Time-Saving Services
680(1)
Staying On Top Of New Developments
681(1)
Careers In Information Technology
681(6)
Internet Addiction
683(1)
The Truth is Out There
684(1)
Where Can I Learn More?
685(2)
APPENDIX A Internet Service Providers 687(6)
How Much Does It Charge?
688(1)
Is Its Modem Pool Reliable and Adequate for the Customer Base Served?
688(1)
How Good Is Its Technical Support Staff?
689(1)
Will It Let You Try Its Services Free For A Week?
689(1)
Does It Offer Any Extra Services?
690(1)
Conclusion
691(2)
APPENDIX B When To Talk To Technical Staff 693(2)
APPENDIX C HTML Tags and Attributes 695(4)
Head, Title, and Body
695(1)
Headings
696(1)
Presentation Tags
696(1)
Informational Tags
696(1)
Text Formatting
696(1)
Lists
697(1)
Graphics
697(1)
Hypertext Links
698(1)
Tables
698(1)
Frames
698(1)
APPENDIX D File Types 699(2)
Macintosh Files
699(1)
PC Files
700(1)
UNIX Files
700(1)
APPENDIX E Proxy Servers 701(2)
For Netscape Communicator
701(1)
For Internet Explorer
702(1)
Glossary 703(16)
Index 719(12)
Credits 731

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >