The Resource My online privacy for seniors, Jason R. Rich

My online privacy for seniors, Jason R. Rich

Label
My online privacy for seniors
Title
My online privacy for seniors
Statement of responsibility
Jason R. Rich
Title variation
Online privacy for seniors
Creator
Author
Subject
Language
eng
Cataloging source
YDX
http://library.link/vocab/creatorName
Rich, Jason
Dewey number
005.8
Illustrations
illustrations
Index
index present
Intended audience
"User level: beginning-intermediate"--Page 4 of cover
LC call number
TK5105.875.I57
LC item number
R4553 2019
Literary form
non fiction
http://library.link/vocab/subjectName
  • Internet
  • Computer security
  • Data protection
  • Internet and older people
  • Technology and older people
  • Computers and older people
Target audience
adult
Label
My online privacy for seniors, Jason R. Rich
Instantiates
Publication
Copyright
Note
Includes index
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
  • text
  • still image
Content type code
  • txt
  • sti
Content type MARC source
  • rdacontent
  • rdacontent
Contents
  • p. 6
  • Learning the Benefits of Using a Virtual Private Network or Two-Factor Authentication
  • p. 77
  • Using Apps on Your Mobile Device to Better Handle Many Online Activities
  • p. 79
  • 3
  • Protect Your Security When Working with Emails
  • p. 83
  • Email Options
  • p. 83
  • Determining Where Email Vulnerabilities Can Happen
  • Set Up a Firewall
  • p. 85
  • Preventing Unauthorized Physical Access to Your Computer or Mobile Device
  • p. 85
  • Protecting Your Computer Against Viruses and Malware
  • p. 86
  • Maintaining an Up-to-Date and Reliable Backup
  • p. 87
  • Create a Backup Using a Windows 10 PC
  • p. 88
  • Create a Backup Using MacOS's Time Machine Feature
  • p. 7
  • p. 92
  • Choosing Additional Online Backup Solutions
  • p. 95
  • Protecting Email Content as It's Moving
  • p. 96
  • Avoiding Phishing Schemes and Spam
  • p. 96
  • Adjusting the Security and Privacy Features When Using Mail
  • p. 99
  • Use the Email Security Features Built in to Mail for Windows 10 PCs
  • Password-Protect Your Wireless (Wi-Fi) Internet Connection
  • p. 99
  • Use the Junk Mail Settings in Mail for the Mac
  • p. 101
  • Use the Email Security Settings for Gmail
  • p. 102
  • Use the Email Security Settings for Yahoo! Mail
  • p. 109
  • Identifying and Avoiding Phishing Schemes
  • p. 112
  • Dealing with a Phishing Scheme Email
  • p. 8
  • p. 115
  • Calling a Legitimate Phone Number for a Bank or Credit Card Issuer
  • p. 116
  • Identifying Phishing Scheme Email Messages
  • p. 117
  • Avoiding Email Security Problems Related to Human Error
  • p. 119
  • 4
  • Handling Online Banking Tasks Securely
  • p. 123
  • Secure Your Computers
  • Sending or Receiving Money Electronically
  • p. 126
  • Addressing Online or Mobile Banking Security Concerns
  • p. 127
  • Protecting Your Online Accounts
  • p. 127
  • Creating a Secure Password and Keeping It a Secret
  • p. 127
  • Changing Your Password Periodically
  • p. 128
  • p. 9
  • Using a Credit Card, not a Debit Card, to Make Online Purchases
  • p. 128
  • Using Electronic Payments at Retail Locations or Online
  • p. 128
  • Setting Up and Using Apple Pay
  • p. 130
  • Set Up Apple Pay to Work with Your iPhone
  • p. 131
  • Make a Purchase Using Apple Pay, Google Pay, or Samsung Pay
  • p. 137
  • Set Up and Manage User Accounts on a Windows 10 PC
  • Using a Virtual Private Network for Online Banking via Wi-Fi
  • p. 139
  • Download and Install a VPN to Your Computer
  • p. 141
  • Download and Install a VPN to Your Mobile Device
  • p. 147
  • Being Aware of Banking-Related Phishing Schemes
  • p. 152
  • Signing Off from Your Online Banking Service When You're Finished
  • p. 153
  • p. 10
  • Reporting a Suspected Problem Immediately
  • p. 153
  • Turning On Two-Factor Authentication for Your Online Accounts
  • p. 154
  • Turn On Two-Factor Authentication for Your Bank's Website
  • p. 154
  • Managing Credit Card Accounts Online
  • p. 157
  • 5
  • Protect Your Privacy and Security When Shopping Online
  • Set Up and Manage User Accounts on a Mac (Running MacOS)
  • p. 159
  • Avoiding Online Shopping Security Risks
  • p. 161
  • Being Aware of Fake Websites
  • p. 162
  • Paying Attention to Product Descriptions
  • p. 163
  • Watching Out for Counterfeit Goods
  • p. 164
  • Ignoring Requests for Too Much Personal Information
  • 1
  • p. 13
  • p. 166
  • Being Careful What You Sign Up For
  • p. 166
  • Understanding Ratings and Reviews
  • p. 168
  • Permitting Cookies When Shopping Online
  • p. 169
  • Verifying the Return Policy
  • p. 170
  • Looking for Free Shipping Offers
  • Secure Your Computer's Web Browser
  • p. 170
  • Ensuring a Secure Internet Connection
  • p. 172
  • Comparing Prices on Websites
  • p. 173
  • Use a Price Comparison Website from a Computer
  • p. 174
  • Use a Price Comparison Website from a Mobile App
  • p. 177
  • Taking Advantage of Electronic Payment Options for Added Security
  • p. 16
  • p. 178
  • Use PayPal to Pay for Online Purchases
  • p. 180
  • 6
  • Use Social Media Safely
  • p. 185
  • Your Information on Social Media Is Typically Public
  • p. 185
  • Becoming Active on Social Media
  • p. 187
  • Customize the Security Settings When Using the Microsoft Edge WebBrowser
  • Socializing (and More) on Facebook
  • p. 188
  • Discerning Fake News from Real News
  • p. 189
  • Addressing Privacy Concerns on Facebook
  • p. 191
  • Getting Started Using and Staying Secure on Facebook
  • p. 194
  • Set Up a Free Facebook Account
  • p. 195
  • p. 17
  • Create Your Public Facebook Profile
  • p. 198
  • Adjust Your Account's Privacy and Security Settings
  • p. 204
  • Customize Face Recognition
  • p. 207
  • Adjust Facebook's Advertising-Related Settings
  • p. 209
  • Adding Friends to Your Facebook Account
  • p. 213
  • Customize the Security Settings When Using the Safari Web Browser
  • Manage Your Facebook Friends
  • p. 214
  • Delete Your Facebook Account
  • p. 215
  • Staying Safe on Twitter and Instagram
  • p. 217
  • Adjusting Twitter and instagram Privacy and Security Settings
  • p. 218
  • Customize Twitter's Settings
  • p. 219
  • p. 19
  • Customize Instagram's Settings
  • p. 224
  • Understanding What You're Posting and Who Will See It
  • p. 227
  • Using Linked In and Other Social Media Services Securely
  • p. 227
  • Thinking Before You Post
  • p. 228
  • Understanding the Pros and Cons of Geotagging
  • p. 229
  • Take Advantage of Web Browser Plug-Ins (Extensions)
  • Turn Off Geotagging from Your iPhone/iPad .
  • p. 230
  • Turn Off Geotagging from Your Android-Based Mobile Device
  • p. 233
  • Turn Off Geotagging on a Case-by-Case Basis
  • p. 236
  • Weighing the Pros and Cons of Tagging Yourself and Others in Photos
  • p. 237
  • 7
  • Protect Your Privacy When Publishing and Sharing Photos Online
  • p. 20
  • p. 241
  • Organizing Your Digital Image Library Can Take Time
  • p. 244
  • Storing, Editing, Organizing, and Sharing Your Digital Images via the Cloud
  • p. 247
  • Using Platform-Related Cloud Photo Storage and Sharing Options
  • p. 247
  • Using Third-Party Cloud Photo Storage and Sharing Options
  • p. 250
  • Use Shutterfly's Share Sites Feature
  • Take Advantage of Security Tools Offered by Your Mobile Devices
  • p. 251
  • Choosing a Cloud-Based Photo Storage and Sharing Service
  • p. 253
  • Sharing Photos via Social Media
  • p. 255
  • Uploading a Photo to Your Instagram Account
  • p. 257
  • Create an Instagram Post
  • p. 258
  • Create a Personalized Online Album on Facebook
  • Online Security Basics
  • p. 21
  • p. 264
  • 8
  • Safely Store Data, Documents, and Files in the Cloud
  • p. 277
  • Benefits of Using Cloud Storage
  • p. 278
  • Understanding Important Cloud Computing Concepts
  • p. 280
  • Configuring Cloud-Based Services
  • p. 282
  • Adjust the Security Settings on Your iPhone or iPad (running iOS 12)
  • Set Up OneDrive Functionality on Your Windows PCs
  • p. 283
  • Set Up iCIoud Functionality on Your Macs
  • p. 286
  • Sharing Content with Others from iCIoud Drive
  • p. 289
  • Using iCIoud with Other MacOS Apps
  • p. 289
  • Using a Cross-Platform Cloud-Based Service
  • p. 294
  • p. 22
  • Sharing Large Files Using Dropbox
  • p. 295
  • Perform a Dropbox Security Checkup
  • p. 299
  • Using Cloud-Based File Sharing Services Safely
  • p. 301
  • 9
  • Customize the Security Settings on Your Smartphone or Tablet
  • p. 307
  • Preventing Unauthorized People from Using Your Mobile Device
  • Adjust the Security Settings on Your Android Mobile Device
  • p. 308
  • Setting Up the Passcode Feature
  • p. 310
  • Set the Passcode (iPhone or iPad)
  • p. 311
  • Set the PIN (Android)
  • p. 313
  • Turning On the Touch ID (iOS) or Finger Scanner (Android)
  • p. 316
  • Activating Touch ID (iPhone or iPad)
  • p. 27
  • p. 316
  • Activating Fingerprint Scan (Android)
  • p. 316
  • Taking Advantage of Face ID (iOS)
  • p. 317
  • Restricting Access to Apps and Content
  • p. 318
  • Taking Advantage of Parental Controls
  • p. 318
  • Adjusting the App-Specific Privacy Settings on Your Mobile Device
  • Manage Your Account Passwords
  • p. 319
  • Keeping Your Mobile Device's Operating System and Apps Up to Date
  • p. 322
  • Updating Your iPhone or iPad's Operating System and Apps
  • p. 322
  • Updating Your Android Mobile Device Operating System and Apps
  • p. 324
  • Managing Your Mobile Device's Wireless Connections
  • p. 325
  • Turning On Bluetooth Settings
  • p. 30
  • p. 327
  • Using AirDrop (iPhone/iPad)
  • p. 329
  • Send App-Specific Content Using AirDrop
  • p. 330 --
  • Use Tools to Manage and Remember Your Passwords
  • p. 31
  • Tips for Creating Secure Passwords
  • p. 3
  • p. 32
  • Apply Multiple Strategies to Protect Yourself Online
  • p. 33
  • 2
  • Safely Surf the Internet
  • p. 37
  • Using Your Favorite Web Browser
  • p. 38
  • Choosing a Web Browser for Your Computer or Mobile Device
  • p. 40
  • Protecting Yourself Online
  • Acquiring a Web Browser
  • p. 42
  • Consider a Specialty Web Browser Built for Privacy
  • p. 43
  • Looking at Cookies
  • p. 44
  • Manage Microsoft Edge's Cookie-Related Features
  • p. 47
  • Manage Safari's Cookie-Related Feature(s)
  • p. 50
  • p. 5
  • Manage Chrome's Cookie-Related Feature(s)
  • p. 51
  • Turning on Your Web Browser's Privacy or Incognito Mode
  • p. 55
  • Turn On Privacy (InPrivate) Mode Using Microsoft Edge
  • p. 56
  • Turn On Private Mode Using Safari
  • p. 57
  • Go Incognito Mode Using Chrome
  • p. 58
  • Simple Steps to Protect Your Privacy
  • Turn on Privacy Mode on Your iPhone's Safari Web Browser
  • p. 59
  • Turn on Privacy Mode on Your iPad's Safari Web Browser
  • p. 60
  • Turn on Privacy Mode on Your Android's Chrome Web Browser
  • p. 61
  • Managing Your Web Browser's History Folder
  • p. 63
  • Work with Microsoft Edge's History Folder
  • p. 64
  • p. 5
  • Work with Safari's History Folder
  • p. 65
  • Work with Chrome's History Folder
  • p. 66
  • Managing Bookmarks and Other Information
  • p. 70
  • Create a New Bookmark
  • p. 71
  • Bookmark with Google Chrome
  • p. 71
  • Improving Internet Security in Your Home
  • Bookmark with Microsoft Edge
  • p. 71
  • Bookmark with Apple Safari
  • p. 72
  • Access Your Bookmarks
  • p. 73
  • Expanding Your Web Browser's Functionality Using Optional Plug-Ins
  • p. 75
  • How to Find, Download, and Install Plug-Ins
  • p. 76
  • Blocking and Managing Unwanted Calls to Your Smartphone
  • p. 333
  • Block Specific Incoming Calls on Your iPhone
  • p. 335
  • Block Specific Incoming Calls on an Android Smartphone
  • p. 337
Control code
on1047655180
Dimensions
24 cm
Extent
xv, 369 pages
Isbn
9780135381212
Lccn
2018967564
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Note
005.8 R373 ; XX-N ; [A18BP180, #10, 6@26.99, wjm/RT ]
Other physical details
color illustrations
System control number
  • (Sirsi) 1047655180
  • (OCoLC)1047655180
Label
My online privacy for seniors, Jason R. Rich
Publication
Copyright
Note
Includes index
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
  • text
  • still image
Content type code
  • txt
  • sti
Content type MARC source
  • rdacontent
  • rdacontent
Contents
  • p. 6
  • Learning the Benefits of Using a Virtual Private Network or Two-Factor Authentication
  • p. 77
  • Using Apps on Your Mobile Device to Better Handle Many Online Activities
  • p. 79
  • 3
  • Protect Your Security When Working with Emails
  • p. 83
  • Email Options
  • p. 83
  • Determining Where Email Vulnerabilities Can Happen
  • Set Up a Firewall
  • p. 85
  • Preventing Unauthorized Physical Access to Your Computer or Mobile Device
  • p. 85
  • Protecting Your Computer Against Viruses and Malware
  • p. 86
  • Maintaining an Up-to-Date and Reliable Backup
  • p. 87
  • Create a Backup Using a Windows 10 PC
  • p. 88
  • Create a Backup Using MacOS's Time Machine Feature
  • p. 7
  • p. 92
  • Choosing Additional Online Backup Solutions
  • p. 95
  • Protecting Email Content as It's Moving
  • p. 96
  • Avoiding Phishing Schemes and Spam
  • p. 96
  • Adjusting the Security and Privacy Features When Using Mail
  • p. 99
  • Use the Email Security Features Built in to Mail for Windows 10 PCs
  • Password-Protect Your Wireless (Wi-Fi) Internet Connection
  • p. 99
  • Use the Junk Mail Settings in Mail for the Mac
  • p. 101
  • Use the Email Security Settings for Gmail
  • p. 102
  • Use the Email Security Settings for Yahoo! Mail
  • p. 109
  • Identifying and Avoiding Phishing Schemes
  • p. 112
  • Dealing with a Phishing Scheme Email
  • p. 8
  • p. 115
  • Calling a Legitimate Phone Number for a Bank or Credit Card Issuer
  • p. 116
  • Identifying Phishing Scheme Email Messages
  • p. 117
  • Avoiding Email Security Problems Related to Human Error
  • p. 119
  • 4
  • Handling Online Banking Tasks Securely
  • p. 123
  • Secure Your Computers
  • Sending or Receiving Money Electronically
  • p. 126
  • Addressing Online or Mobile Banking Security Concerns
  • p. 127
  • Protecting Your Online Accounts
  • p. 127
  • Creating a Secure Password and Keeping It a Secret
  • p. 127
  • Changing Your Password Periodically
  • p. 128
  • p. 9
  • Using a Credit Card, not a Debit Card, to Make Online Purchases
  • p. 128
  • Using Electronic Payments at Retail Locations or Online
  • p. 128
  • Setting Up and Using Apple Pay
  • p. 130
  • Set Up Apple Pay to Work with Your iPhone
  • p. 131
  • Make a Purchase Using Apple Pay, Google Pay, or Samsung Pay
  • p. 137
  • Set Up and Manage User Accounts on a Windows 10 PC
  • Using a Virtual Private Network for Online Banking via Wi-Fi
  • p. 139
  • Download and Install a VPN to Your Computer
  • p. 141
  • Download and Install a VPN to Your Mobile Device
  • p. 147
  • Being Aware of Banking-Related Phishing Schemes
  • p. 152
  • Signing Off from Your Online Banking Service When You're Finished
  • p. 153
  • p. 10
  • Reporting a Suspected Problem Immediately
  • p. 153
  • Turning On Two-Factor Authentication for Your Online Accounts
  • p. 154
  • Turn On Two-Factor Authentication for Your Bank's Website
  • p. 154
  • Managing Credit Card Accounts Online
  • p. 157
  • 5
  • Protect Your Privacy and Security When Shopping Online
  • Set Up and Manage User Accounts on a Mac (Running MacOS)
  • p. 159
  • Avoiding Online Shopping Security Risks
  • p. 161
  • Being Aware of Fake Websites
  • p. 162
  • Paying Attention to Product Descriptions
  • p. 163
  • Watching Out for Counterfeit Goods
  • p. 164
  • Ignoring Requests for Too Much Personal Information
  • 1
  • p. 13
  • p. 166
  • Being Careful What You Sign Up For
  • p. 166
  • Understanding Ratings and Reviews
  • p. 168
  • Permitting Cookies When Shopping Online
  • p. 169
  • Verifying the Return Policy
  • p. 170
  • Looking for Free Shipping Offers
  • Secure Your Computer's Web Browser
  • p. 170
  • Ensuring a Secure Internet Connection
  • p. 172
  • Comparing Prices on Websites
  • p. 173
  • Use a Price Comparison Website from a Computer
  • p. 174
  • Use a Price Comparison Website from a Mobile App
  • p. 177
  • Taking Advantage of Electronic Payment Options for Added Security
  • p. 16
  • p. 178
  • Use PayPal to Pay for Online Purchases
  • p. 180
  • 6
  • Use Social Media Safely
  • p. 185
  • Your Information on Social Media Is Typically Public
  • p. 185
  • Becoming Active on Social Media
  • p. 187
  • Customize the Security Settings When Using the Microsoft Edge WebBrowser
  • Socializing (and More) on Facebook
  • p. 188
  • Discerning Fake News from Real News
  • p. 189
  • Addressing Privacy Concerns on Facebook
  • p. 191
  • Getting Started Using and Staying Secure on Facebook
  • p. 194
  • Set Up a Free Facebook Account
  • p. 195
  • p. 17
  • Create Your Public Facebook Profile
  • p. 198
  • Adjust Your Account's Privacy and Security Settings
  • p. 204
  • Customize Face Recognition
  • p. 207
  • Adjust Facebook's Advertising-Related Settings
  • p. 209
  • Adding Friends to Your Facebook Account
  • p. 213
  • Customize the Security Settings When Using the Safari Web Browser
  • Manage Your Facebook Friends
  • p. 214
  • Delete Your Facebook Account
  • p. 215
  • Staying Safe on Twitter and Instagram
  • p. 217
  • Adjusting Twitter and instagram Privacy and Security Settings
  • p. 218
  • Customize Twitter's Settings
  • p. 219
  • p. 19
  • Customize Instagram's Settings
  • p. 224
  • Understanding What You're Posting and Who Will See It
  • p. 227
  • Using Linked In and Other Social Media Services Securely
  • p. 227
  • Thinking Before You Post
  • p. 228
  • Understanding the Pros and Cons of Geotagging
  • p. 229
  • Take Advantage of Web Browser Plug-Ins (Extensions)
  • Turn Off Geotagging from Your iPhone/iPad .
  • p. 230
  • Turn Off Geotagging from Your Android-Based Mobile Device
  • p. 233
  • Turn Off Geotagging on a Case-by-Case Basis
  • p. 236
  • Weighing the Pros and Cons of Tagging Yourself and Others in Photos
  • p. 237
  • 7
  • Protect Your Privacy When Publishing and Sharing Photos Online
  • p. 20
  • p. 241
  • Organizing Your Digital Image Library Can Take Time
  • p. 244
  • Storing, Editing, Organizing, and Sharing Your Digital Images via the Cloud
  • p. 247
  • Using Platform-Related Cloud Photo Storage and Sharing Options
  • p. 247
  • Using Third-Party Cloud Photo Storage and Sharing Options
  • p. 250
  • Use Shutterfly's Share Sites Feature
  • Take Advantage of Security Tools Offered by Your Mobile Devices
  • p. 251
  • Choosing a Cloud-Based Photo Storage and Sharing Service
  • p. 253
  • Sharing Photos via Social Media
  • p. 255
  • Uploading a Photo to Your Instagram Account
  • p. 257
  • Create an Instagram Post
  • p. 258
  • Create a Personalized Online Album on Facebook
  • Online Security Basics
  • p. 21
  • p. 264
  • 8
  • Safely Store Data, Documents, and Files in the Cloud
  • p. 277
  • Benefits of Using Cloud Storage
  • p. 278
  • Understanding Important Cloud Computing Concepts
  • p. 280
  • Configuring Cloud-Based Services
  • p. 282
  • Adjust the Security Settings on Your iPhone or iPad (running iOS 12)
  • Set Up OneDrive Functionality on Your Windows PCs
  • p. 283
  • Set Up iCIoud Functionality on Your Macs
  • p. 286
  • Sharing Content with Others from iCIoud Drive
  • p. 289
  • Using iCIoud with Other MacOS Apps
  • p. 289
  • Using a Cross-Platform Cloud-Based Service
  • p. 294
  • p. 22
  • Sharing Large Files Using Dropbox
  • p. 295
  • Perform a Dropbox Security Checkup
  • p. 299
  • Using Cloud-Based File Sharing Services Safely
  • p. 301
  • 9
  • Customize the Security Settings on Your Smartphone or Tablet
  • p. 307
  • Preventing Unauthorized People from Using Your Mobile Device
  • Adjust the Security Settings on Your Android Mobile Device
  • p. 308
  • Setting Up the Passcode Feature
  • p. 310
  • Set the Passcode (iPhone or iPad)
  • p. 311
  • Set the PIN (Android)
  • p. 313
  • Turning On the Touch ID (iOS) or Finger Scanner (Android)
  • p. 316
  • Activating Touch ID (iPhone or iPad)
  • p. 27
  • p. 316
  • Activating Fingerprint Scan (Android)
  • p. 316
  • Taking Advantage of Face ID (iOS)
  • p. 317
  • Restricting Access to Apps and Content
  • p. 318
  • Taking Advantage of Parental Controls
  • p. 318
  • Adjusting the App-Specific Privacy Settings on Your Mobile Device
  • Manage Your Account Passwords
  • p. 319
  • Keeping Your Mobile Device's Operating System and Apps Up to Date
  • p. 322
  • Updating Your iPhone or iPad's Operating System and Apps
  • p. 322
  • Updating Your Android Mobile Device Operating System and Apps
  • p. 324
  • Managing Your Mobile Device's Wireless Connections
  • p. 325
  • Turning On Bluetooth Settings
  • p. 30
  • p. 327
  • Using AirDrop (iPhone/iPad)
  • p. 329
  • Send App-Specific Content Using AirDrop
  • p. 330 --
  • Use Tools to Manage and Remember Your Passwords
  • p. 31
  • Tips for Creating Secure Passwords
  • p. 3
  • p. 32
  • Apply Multiple Strategies to Protect Yourself Online
  • p. 33
  • 2
  • Safely Surf the Internet
  • p. 37
  • Using Your Favorite Web Browser
  • p. 38
  • Choosing a Web Browser for Your Computer or Mobile Device
  • p. 40
  • Protecting Yourself Online
  • Acquiring a Web Browser
  • p. 42
  • Consider a Specialty Web Browser Built for Privacy
  • p. 43
  • Looking at Cookies
  • p. 44
  • Manage Microsoft Edge's Cookie-Related Features
  • p. 47
  • Manage Safari's Cookie-Related Feature(s)
  • p. 50
  • p. 5
  • Manage Chrome's Cookie-Related Feature(s)
  • p. 51
  • Turning on Your Web Browser's Privacy or Incognito Mode
  • p. 55
  • Turn On Privacy (InPrivate) Mode Using Microsoft Edge
  • p. 56
  • Turn On Private Mode Using Safari
  • p. 57
  • Go Incognito Mode Using Chrome
  • p. 58
  • Simple Steps to Protect Your Privacy
  • Turn on Privacy Mode on Your iPhone's Safari Web Browser
  • p. 59
  • Turn on Privacy Mode on Your iPad's Safari Web Browser
  • p. 60
  • Turn on Privacy Mode on Your Android's Chrome Web Browser
  • p. 61
  • Managing Your Web Browser's History Folder
  • p. 63
  • Work with Microsoft Edge's History Folder
  • p. 64
  • p. 5
  • Work with Safari's History Folder
  • p. 65
  • Work with Chrome's History Folder
  • p. 66
  • Managing Bookmarks and Other Information
  • p. 70
  • Create a New Bookmark
  • p. 71
  • Bookmark with Google Chrome
  • p. 71
  • Improving Internet Security in Your Home
  • Bookmark with Microsoft Edge
  • p. 71
  • Bookmark with Apple Safari
  • p. 72
  • Access Your Bookmarks
  • p. 73
  • Expanding Your Web Browser's Functionality Using Optional Plug-Ins
  • p. 75
  • How to Find, Download, and Install Plug-Ins
  • p. 76
  • Blocking and Managing Unwanted Calls to Your Smartphone
  • p. 333
  • Block Specific Incoming Calls on Your iPhone
  • p. 335
  • Block Specific Incoming Calls on an Android Smartphone
  • p. 337
Control code
on1047655180
Dimensions
24 cm
Extent
xv, 369 pages
Isbn
9780135381212
Lccn
2018967564
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Note
005.8 R373 ; XX-N ; [A18BP180, #10, 6@26.99, wjm/RT ]
Other physical details
color illustrations
System control number
  • (Sirsi) 1047655180
  • (OCoLC)1047655180

Library Locations

    • Blue Springs South BranchBorrow it
      2220 S. 7 Hwy., Blue Springs, MO, 64014, US
      38.99708 -94.27243
    • Boardwalk BranchBorrow it
      8656 N. Ambassador Drive, Kansas City, MO, 64154 , US
      39.25022 -94.65048
    • Buckner BranchBorrow it
      19 E. Jefferson St., Buckner, MO, 64016 , US
      39.13505 -94.19764
    • Grain Valley BranchBorrow it
      110 Front St., Grain Valley, MO, 64029 , US
      39.015291 -94.199017
    • North Independence BranchBorrow it
      317 W. 24 Hwy., Independence, MO, 64050 , US
      39.100794 -94.418828
Processing Feedback ...