The Resource The smart girl's guide to privacy : practical tips for staying safe online, Violet Blue
The smart girl's guide to privacy : practical tips for staying safe online, Violet Blue
Resource Information
The item The smart girl's guide to privacy : practical tips for staying safe online, Violet Blue represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Mid-Continent Public Library.This item is available to borrow from 3 library branches.
Resource Information
The item The smart girl's guide to privacy : practical tips for staying safe online, Violet Blue represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Mid-Continent Public Library.
This item is available to borrow from 3 library branches.
- Summary
- Discusses how to protect personal information from online privacy violations. Covers how to set and store secure passwords, monitor online visibility, safely use social media and apps, and create online profiles. Contains emergency instructions for those who have been hacked or had their identity, phone, or laptop stolen
- Language
- eng
- Extent
- xi, 164 pages
- Contents
-
- 6
- 56
- Navigating the Legal System
- 56
- Getting a Restraining Order
- 58
- Getting Your Private Photos Offline
- 59
- Doing It Yourself
- 60
- If You're a Minor
- Losing Your Privacy
- 63
- Outsourcing the Work
- 64
- Preventative Maintenance
- 66
- 5
- Identity theft
- 69
- Signs of Identity Theft
- 70
- 8
- Run, Don't Walk
- 72
- Place a Fraud Alert
- 72
- Order Free Credit Reports
- 73
- File an Identity Theft Report
- 73
- Contact the IRS
- 73
- Ways You Can Lose Your Privacy
- Alert Businesses
- 73
- Don't Let It Happen to You
- 74
- Prevent Identity Theft
- 74
- Avoid Phishing Attacks
- 75
- If Your Phone or Computer Is Stolen
- 77
- 9
- Install an Antitheft Tracking App
- 77
- Permanently Delete Information from Your Device
- 78
- 6
- How to share
- 81
- Social Media Checklist
- 82
- Sharing Only What You Want
- Protect Yourself Right Now
- 83
- Friending
- 85
- But I Can't Give Up Facebook (or Instagram, or Twitter, or FourSquare, or...)
- 86
- Quit Humping My Leg, Facebook
- 87
- Location Information in Photos
- 89
- Be Smart About Checking In
- 11
- 89
- Controlling What You Share with Google and Google+
- 89
- Managing Your Google+ Profile
- 90
- Locking Down the Privacy Settings on Your New Phone
- 91
- Safely Disposing of Old Devices
- 92
- 7
- Tape Over Your Webcam
- People-search websites
- 95
- But I'm Not That Interesting
- 96
- Dangers Lurking in People-Finder Sites
- 98
- How People-Finder Sites Get Your Information
- 99
- It Sounds Like There's Nothing I Can Do, So Why Do Anything?
- 100
- 11
- 8
- Dating and sexytime
- 103
- Make a Smart Dating Profile
- 104
- Screen Out Scammers and Stalkers
- 106
- Make the Internet Wear a Condom
- 107
- Private Time Online: Browsing Privately and Securing Your Sensitive Information
- Lock Your Phone, Computer, and Tablet
- 108
- Search Engine Creep
- 109
- Cookies
- 110
- Leave No Trace
- 111
- Keep Your Sensitive Files Private
- 111
- Erase Files Completely
- 1
- 12
- 111
- Make Your Browser Private
- 112
- Do Not Track
- 113
- Private Browsing
- 114
- How to Tell If Someone Was on Your Computer
- 115
- 9
- Do a Privacy Check-Up
- Ninja tricks
- 119
- Ninja Your Credit Cards
- 120
- Ninja Move: Freeze Your Credit
- 121
- Stealth Out Your Mailing Address
- 122
- Stealth Out Your Phone Number
- 123
- 13
- Ninja Tricks: Encrypt Your Private Communication
- 123
- Protecting Your Email
- 124
- Keeping Your Chats Private
- 126
- Encrypting Your Internet Activity
- 126
- Ninja Choke Hold: Strong, Easy Privacy Apps
- 127
- Don't Email Your ID
- Ninja Your IP Address
- 128
- Use Tor
- 128
- Use a VPN
- 129
- Get Hard-core: Make a Data Silo
- 130
- 10
- I hate passwords
- 13
- 133
- How People Steal Passwords
- 134
- But I Have to Share My Password
- 135
- Password Fu
- 137
- Use a Password Manager and Install an Antitheft App
- 14
- Be the Firewall
- 14
- 2
- Get smart
- But it's just my phone number
- 17
- You Control What You Share
- 17
- Private Spaces and Activities
- 18
- Lock Down Your Personally Identifying Information
- 21
- Red Alert List
- 22
- 1
- Yellow Alert List
- 23
- Green List
- 24
- Information-Sharing Guidelines
- 25
- He Said, She Said
- 26
- Worst-Case Scenario
- 28
- Take the Online Privacy Test
- 3
- You got hacked
- 31
- One Compromised Account to Rule Them All
- 32
- What Honan Did Wrong
- 33
- Hack-Proof Your Life
- 34
- Make Your Address Hard to Find
- 4
- 34
- Don't Link Major Accounts
- 34
- Don't Use One Service for Everything
- 35
- Back Up Your Everything: Your Contacts, Your Files, Your Photos
- 35
- Encrypt Your Computer's Hard Drive
- 36
- What to Do When You've Been Attacked
- Eight Privacy Tips to Use Right Now
- 36
- Recover Your Accounts and Data
- 38
- When a Service Gets Hacked
- 40
- If Your Financial Information May Have Been
- Exposed in a Data Breach
- 41
- How to Change Your Email Address
- 43
- 4
- Choose a New Home
- 44
- Set Up Forwarding
- 45
- Move In
- 46
- Update Your Accounts
- 47
- Tell Everyone
- 47
- Targets and Nontargets
- 4
- Female trouble
- 49
- Recovering from Harassment
- 50
- When Will It Stop?
- 53
- Staying Strong
- 54
- Fighting Back
- Isbn
- 9781593276485
- Label
- The smart girl's guide to privacy : practical tips for staying safe online
- Title
- The smart girl's guide to privacy
- Title remainder
- practical tips for staying safe online
- Statement of responsibility
- Violet Blue
- Language
- eng
- Summary
- Discusses how to protect personal information from online privacy violations. Covers how to set and store secure passwords, monitor online visibility, safely use social media and apps, and create online profiles. Contains emergency instructions for those who have been hacked or had their identity, phone, or laptop stolen
- Cataloging source
- DLC
- http://library.link/vocab/creatorName
- Blue, Violet
- Dewey number
- 613.6/602854678
- Index
- index present
- LC call number
- HV6773
- LC item number
- .B56 2015
- Literary form
- non fiction
- Nature of contents
- bibliography
- http://library.link/vocab/subjectName
-
- Computer crimes
- Internet
- Internet and women
- Internet
- Privacy, Right of
- Target audience
- adult
- Label
- The smart girl's guide to privacy : practical tips for staying safe online, Violet Blue
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- volume
- Carrier category code
-
- nc
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- 6
- 56
- Navigating the Legal System
- 56
- Getting a Restraining Order
- 58
- Getting Your Private Photos Offline
- 59
- Doing It Yourself
- 60
- If You're a Minor
- Losing Your Privacy
- 63
- Outsourcing the Work
- 64
- Preventative Maintenance
- 66
- 5
- Identity theft
- 69
- Signs of Identity Theft
- 70
- 8
- Run, Don't Walk
- 72
- Place a Fraud Alert
- 72
- Order Free Credit Reports
- 73
- File an Identity Theft Report
- 73
- Contact the IRS
- 73
- Ways You Can Lose Your Privacy
- Alert Businesses
- 73
- Don't Let It Happen to You
- 74
- Prevent Identity Theft
- 74
- Avoid Phishing Attacks
- 75
- If Your Phone or Computer Is Stolen
- 77
- 9
- Install an Antitheft Tracking App
- 77
- Permanently Delete Information from Your Device
- 78
- 6
- How to share
- 81
- Social Media Checklist
- 82
- Sharing Only What You Want
- Protect Yourself Right Now
- 83
- Friending
- 85
- But I Can't Give Up Facebook (or Instagram, or Twitter, or FourSquare, or...)
- 86
- Quit Humping My Leg, Facebook
- 87
- Location Information in Photos
- 89
- Be Smart About Checking In
- 11
- 89
- Controlling What You Share with Google and Google+
- 89
- Managing Your Google+ Profile
- 90
- Locking Down the Privacy Settings on Your New Phone
- 91
- Safely Disposing of Old Devices
- 92
- 7
- Tape Over Your Webcam
- People-search websites
- 95
- But I'm Not That Interesting
- 96
- Dangers Lurking in People-Finder Sites
- 98
- How People-Finder Sites Get Your Information
- 99
- It Sounds Like There's Nothing I Can Do, So Why Do Anything?
- 100
- 11
- 8
- Dating and sexytime
- 103
- Make a Smart Dating Profile
- 104
- Screen Out Scammers and Stalkers
- 106
- Make the Internet Wear a Condom
- 107
- Private Time Online: Browsing Privately and Securing Your Sensitive Information
- Lock Your Phone, Computer, and Tablet
- 108
- Search Engine Creep
- 109
- Cookies
- 110
- Leave No Trace
- 111
- Keep Your Sensitive Files Private
- 111
- Erase Files Completely
- 1
- 12
- 111
- Make Your Browser Private
- 112
- Do Not Track
- 113
- Private Browsing
- 114
- How to Tell If Someone Was on Your Computer
- 115
- 9
- Do a Privacy Check-Up
- Ninja tricks
- 119
- Ninja Your Credit Cards
- 120
- Ninja Move: Freeze Your Credit
- 121
- Stealth Out Your Mailing Address
- 122
- Stealth Out Your Phone Number
- 123
- 13
- Ninja Tricks: Encrypt Your Private Communication
- 123
- Protecting Your Email
- 124
- Keeping Your Chats Private
- 126
- Encrypting Your Internet Activity
- 126
- Ninja Choke Hold: Strong, Easy Privacy Apps
- 127
- Don't Email Your ID
- Ninja Your IP Address
- 128
- Use Tor
- 128
- Use a VPN
- 129
- Get Hard-core: Make a Data Silo
- 130
- 10
- I hate passwords
- 13
- 133
- How People Steal Passwords
- 134
- But I Have to Share My Password
- 135
- Password Fu
- 137
- Use a Password Manager and Install an Antitheft App
- 14
- Be the Firewall
- 14
- 2
- Get smart
- But it's just my phone number
- 17
- You Control What You Share
- 17
- Private Spaces and Activities
- 18
- Lock Down Your Personally Identifying Information
- 21
- Red Alert List
- 22
- 1
- Yellow Alert List
- 23
- Green List
- 24
- Information-Sharing Guidelines
- 25
- He Said, She Said
- 26
- Worst-Case Scenario
- 28
- Take the Online Privacy Test
- 3
- You got hacked
- 31
- One Compromised Account to Rule Them All
- 32
- What Honan Did Wrong
- 33
- Hack-Proof Your Life
- 34
- Make Your Address Hard to Find
- 4
- 34
- Don't Link Major Accounts
- 34
- Don't Use One Service for Everything
- 35
- Back Up Your Everything: Your Contacts, Your Files, Your Photos
- 35
- Encrypt Your Computer's Hard Drive
- 36
- What to Do When You've Been Attacked
- Eight Privacy Tips to Use Right Now
- 36
- Recover Your Accounts and Data
- 38
- When a Service Gets Hacked
- 40
- If Your Financial Information May Have Been
- Exposed in a Data Breach
- 41
- How to Change Your Email Address
- 43
- 4
- Choose a New Home
- 44
- Set Up Forwarding
- 45
- Move In
- 46
- Update Your Accounts
- 47
- Tell Everyone
- 47
- Targets and Nontargets
- 4
- Female trouble
- 49
- Recovering from Harassment
- 50
- When Will It Stop?
- 53
- Staying Strong
- 54
- Fighting Back
- Control code
- ocn896860507
- Dimensions
- 23 cm
- Extent
- xi, 164 pages
- Isbn
- 9781593276485
- Lccn
- 2015013420
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
-
- n
- Note
- 364.168 B625 ; XX-N ; [Z15BP002, #61, 3@17.95, LAP/bdh]
- System control number
-
- (Sirsi) 896860507
- (OCoLC)896860507
- Label
- The smart girl's guide to privacy : practical tips for staying safe online, Violet Blue
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- volume
- Carrier category code
-
- nc
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- 6
- 56
- Navigating the Legal System
- 56
- Getting a Restraining Order
- 58
- Getting Your Private Photos Offline
- 59
- Doing It Yourself
- 60
- If You're a Minor
- Losing Your Privacy
- 63
- Outsourcing the Work
- 64
- Preventative Maintenance
- 66
- 5
- Identity theft
- 69
- Signs of Identity Theft
- 70
- 8
- Run, Don't Walk
- 72
- Place a Fraud Alert
- 72
- Order Free Credit Reports
- 73
- File an Identity Theft Report
- 73
- Contact the IRS
- 73
- Ways You Can Lose Your Privacy
- Alert Businesses
- 73
- Don't Let It Happen to You
- 74
- Prevent Identity Theft
- 74
- Avoid Phishing Attacks
- 75
- If Your Phone or Computer Is Stolen
- 77
- 9
- Install an Antitheft Tracking App
- 77
- Permanently Delete Information from Your Device
- 78
- 6
- How to share
- 81
- Social Media Checklist
- 82
- Sharing Only What You Want
- Protect Yourself Right Now
- 83
- Friending
- 85
- But I Can't Give Up Facebook (or Instagram, or Twitter, or FourSquare, or...)
- 86
- Quit Humping My Leg, Facebook
- 87
- Location Information in Photos
- 89
- Be Smart About Checking In
- 11
- 89
- Controlling What You Share with Google and Google+
- 89
- Managing Your Google+ Profile
- 90
- Locking Down the Privacy Settings on Your New Phone
- 91
- Safely Disposing of Old Devices
- 92
- 7
- Tape Over Your Webcam
- People-search websites
- 95
- But I'm Not That Interesting
- 96
- Dangers Lurking in People-Finder Sites
- 98
- How People-Finder Sites Get Your Information
- 99
- It Sounds Like There's Nothing I Can Do, So Why Do Anything?
- 100
- 11
- 8
- Dating and sexytime
- 103
- Make a Smart Dating Profile
- 104
- Screen Out Scammers and Stalkers
- 106
- Make the Internet Wear a Condom
- 107
- Private Time Online: Browsing Privately and Securing Your Sensitive Information
- Lock Your Phone, Computer, and Tablet
- 108
- Search Engine Creep
- 109
- Cookies
- 110
- Leave No Trace
- 111
- Keep Your Sensitive Files Private
- 111
- Erase Files Completely
- 1
- 12
- 111
- Make Your Browser Private
- 112
- Do Not Track
- 113
- Private Browsing
- 114
- How to Tell If Someone Was on Your Computer
- 115
- 9
- Do a Privacy Check-Up
- Ninja tricks
- 119
- Ninja Your Credit Cards
- 120
- Ninja Move: Freeze Your Credit
- 121
- Stealth Out Your Mailing Address
- 122
- Stealth Out Your Phone Number
- 123
- 13
- Ninja Tricks: Encrypt Your Private Communication
- 123
- Protecting Your Email
- 124
- Keeping Your Chats Private
- 126
- Encrypting Your Internet Activity
- 126
- Ninja Choke Hold: Strong, Easy Privacy Apps
- 127
- Don't Email Your ID
- Ninja Your IP Address
- 128
- Use Tor
- 128
- Use a VPN
- 129
- Get Hard-core: Make a Data Silo
- 130
- 10
- I hate passwords
- 13
- 133
- How People Steal Passwords
- 134
- But I Have to Share My Password
- 135
- Password Fu
- 137
- Use a Password Manager and Install an Antitheft App
- 14
- Be the Firewall
- 14
- 2
- Get smart
- But it's just my phone number
- 17
- You Control What You Share
- 17
- Private Spaces and Activities
- 18
- Lock Down Your Personally Identifying Information
- 21
- Red Alert List
- 22
- 1
- Yellow Alert List
- 23
- Green List
- 24
- Information-Sharing Guidelines
- 25
- He Said, She Said
- 26
- Worst-Case Scenario
- 28
- Take the Online Privacy Test
- 3
- You got hacked
- 31
- One Compromised Account to Rule Them All
- 32
- What Honan Did Wrong
- 33
- Hack-Proof Your Life
- 34
- Make Your Address Hard to Find
- 4
- 34
- Don't Link Major Accounts
- 34
- Don't Use One Service for Everything
- 35
- Back Up Your Everything: Your Contacts, Your Files, Your Photos
- 35
- Encrypt Your Computer's Hard Drive
- 36
- What to Do When You've Been Attacked
- Eight Privacy Tips to Use Right Now
- 36
- Recover Your Accounts and Data
- 38
- When a Service Gets Hacked
- 40
- If Your Financial Information May Have Been
- Exposed in a Data Breach
- 41
- How to Change Your Email Address
- 43
- 4
- Choose a New Home
- 44
- Set Up Forwarding
- 45
- Move In
- 46
- Update Your Accounts
- 47
- Tell Everyone
- 47
- Targets and Nontargets
- 4
- Female trouble
- 49
- Recovering from Harassment
- 50
- When Will It Stop?
- 53
- Staying Strong
- 54
- Fighting Back
- Control code
- ocn896860507
- Dimensions
- 23 cm
- Extent
- xi, 164 pages
- Isbn
- 9781593276485
- Lccn
- 2015013420
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
-
- n
- Note
- 364.168 B625 ; XX-N ; [Z15BP002, #61, 3@17.95, LAP/bdh]
- System control number
-
- (Sirsi) 896860507
- (OCoLC)896860507
Library Locations
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.mymcpl.org/portal/The-smart-girls-guide-to-privacy--practical/e5UlAmrWqvs/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.mymcpl.org/portal/The-smart-girls-guide-to-privacy--practical/e5UlAmrWqvs/">The smart girl's guide to privacy : practical tips for staying safe online, Violet Blue</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.mymcpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.mymcpl.org/">Mid-Continent Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item The smart girl's guide to privacy : practical tips for staying safe online, Violet Blue
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.mymcpl.org/portal/The-smart-girls-guide-to-privacy--practical/e5UlAmrWqvs/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.mymcpl.org/portal/The-smart-girls-guide-to-privacy--practical/e5UlAmrWqvs/">The smart girl's guide to privacy : practical tips for staying safe online, Violet Blue</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.mymcpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.mymcpl.org/">Mid-Continent Public Library</a></span></span></span></span></div>