User manual
Table Of Contents
- Copyright Page
- Table of Contents
- Introduction
- Getting Started
- Safety and Care
- Using NOOK Gestures
- Navigation Buttons
- The Status Bar
- GlowLight
- Home Screen
- Reading Books on Your NOOK
- Reading Magazines and Newspapers on Your NOOK
- The Library on Your NOOK
- Shopping on Your NOOK
- Using B&N Readouts™
- Using Your NOOK in a Barnes & Noble Store
- Searching Your NOOK
- NOOK Settings
- Account Screen
- Using Your NOOK at Wi-Fi Hotspots
- Updating the Software on Your NOOK
- Tips and Troubleshooting
- Appendix A: Page Numbering and File Formats
- Appendix B: International Use and Languages
- Appendix C: One-Year Limited Warranty
- Appendix D: Trademarks
- Appendix E: FCC Notices
- Appendix F: Industry Canada Notice
- Appendix G: Terms of Service
- Appendix H: AT&T Terms of Service & Acceptable Use Policy
- Appendix I: Natural Resources Canada
- Appendix J: Intertek Safety Certification
Service(s) in such a manner that network abuse is prevented or minimized
to the greatest extent possible. It is Customer’s responsibility to take
corrective actions on vulnerable or exploited systems to prevent continued
abuse. Violations of system or network security are prohibited and may
result in criminal and/or civil liability.
AT&T IP Services may not be used to interfere with, to gain unauthorized
access to, or otherwise violate the security of AT&T’s or another party’s
server, network, personal computer, network access or control devices,
software or data, or other system, or to attempt to do any of the foregoing.
Examples of violations of system or network security include but are not
limited to: intercepting, interfering with or redirecting e-mail intended for
third parties, or any form of network monitoring, scanning or probing, or
other action for the unauthorized interception of data or harvesting of email
addresses; hacking - attempting to attack, breach, circumvent or test the
vulnerability of the user authentication or security of any host, network,
server, personal computer, network access and control devices, software, or
data without express authorization of the owner of the system or network;
impersonating others in order to obtain another user’s account password or
other personal information; using the IP Service(s) to deliver spyware, or
secretly or deceptively obtain the personal information of third parties
(phishing, etc.), or engage in modem hijacking; using any program, file,
script, command or the transmission of any message or content of any kind,
designed to interfere with a terminal session or the access or use of the
Internet or any other means of communication; distributing or using tools
designed to compromise security, including cracking tools, password
guessing programs, packet sniffers or network probing tools (except in the
case of authorized legitimate network security operations); unauthorized
monitoring of data or traffic on any network or system without express
authorization of the owner of the system or network; this would include use
of sniffers or SNMP tools; falsifying packet header, sender, or User
information whether in whole or in part to mask the identity of the sender,
originator or point of origin; knowingly uploading or distributing files that
contain viruses, Trojan horses, worms, time bombs, cancel bots, corrupted
files, or any other similar software or programs that may damage the
operation of another’s computer or property of another; engaging in the










