Logo

Netiquette by Virginia Shea

Large book cover: Netiquette

Netiquette
by

Publisher: Albion Books
ISBN/ASIN: 0963702513
ISBN-13: 9780963702517

Description:
This book brings etiquette to the bustling frontiers of cyberspace. In a series of entertaining essays, the author establishes the do's and the don'ts of communicating online, from the Golden Rule to the art of the flame, from the elements of electronic style to virtual romance. Accessible to both network wizard and clueless newbie, this is the first book to offer the guidance that all users need to be perfectly polite online.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: Tools for ThoughtTools for Thought
by - The MIT Press
Where will our new machines take us? Back in 1985, forward-thinking Howard Rheingold asked research pioneers to describe the nascent personal-computer revolution and its trajectory. The book is an excellent slice of retrospective 'futurism'.
(11519 views)
Book cover: The Virtual Community: Homesteading on the Electronic FrontierThe Virtual Community: Homesteading on the Electronic Frontier
by - Perseus Books
Written by the man known as the First Citizen of the Internet, this book covers Rheingold's experiences with virtual communities. It starts off with his home community, The Well, out of Sausilito, CA, and makes its way through MUDs and beyond.
(14993 views)
Book cover: Moths to the Flame: The Seductions of Computer TechnologyMoths to the Flame: The Seductions of Computer Technology
by - The MIT Press
The book is a mixture of futuristic prophecy and historical perspective covering all aspects of computer technology, some frightening, some fanciful. Rawlins reminds us that computers can only reflect the needs and values of their users.
(11273 views)
Book cover: The Dark Visitor: Inside the World of Chinese HackersThe Dark Visitor: Inside the World of Chinese Hackers
by - Lulu.com
This book analyzes the history, ideology, organization, exploits, and political motivations of the Chinese hacker network. Whenever possible, the information contained herein has been taken directly from the Chinese hacker organization itself.
(12055 views)