Understanding Computers: Today & Tomorrow, Comprehensive 2007 Update EditionGive your students a classic, well-rounded introduction to computer concepts with a modern twist! Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version. |
From inside the book
Results 1-3 of 26
Page 209
... phishing- items that match the user's supplied search terms . Most of these search tools create an index of the ... [ phishing ] results from Google Desktop Search - Microsoft in ... Edit View Favorites Tools Help File more >> Desktop ...
... phishing- items that match the user's supplied search terms . Most of these search tools create an index of the ... [ phishing ] results from Google Desktop Search - Microsoft in ... Edit View Favorites Tools Help File more >> Desktop ...
Page 386
Deborah Morley. FIGURE 9-17 Phishing . Phishing schemes use legitimate - looking e - mails to trick users into providing private information . Like other types of fraud , online auction fraud is illegal , but these criminals are often ...
Deborah Morley. FIGURE 9-17 Phishing . Phishing schemes use legitimate - looking e - mails to trick users into providing private information . Like other types of fraud , online auction fraud is illegal , but these criminals are often ...
Page 18
... phishing e - mails in 2006 - nearly double the number in 2004 and the average amount lost by phishing victims grew from $ 257 to $ 1,244 . Phishers are increasingly targeting higher- income individuals who tend to perform more ...
... phishing e - mails in 2006 - nearly double the number in 2004 and the average amount lost by phishing victims grew from $ 257 to $ 1,244 . Phishers are increasingly targeting higher- income individuals who tend to perform more ...
Other editions - View all
Common terms and phrases
activities addition allow application software Blah browser cameras Chapter Objective communications connect contain create credit card customers database designed desktop PCs discs discussed disk display document e-commerce e-mail messages Edit View Favorites electronic employees encryption example Favorites Tools Help File Edit View flash memory folder format graphics handheld PCs hard drive hardware identity theft images individuals input installed keyboard located malware Microsoft Internet Explorer monitor movie multimedia operating system options organization password phishing printers processing programming language record RFID screen server shown in Figure smart card software program specific spyware storage stored tablet PC Test types typically users View Favorites Tools Web bugs Web-based Wi-Fi Windows wireless XHTML