User manual
Table Of Contents
- Introduction
- Getting Started With Your NOOK
- Safety and Care
- Using Gestures to Control Your NOOK
- The NOOK Navigation Buttons
- The Status Bar
- GlowLight
- The Home Screen
- Reading Books on Your NOOK
- Reading Magazines and Newspapers on Your NOOK
- The Library on Your NOOK
- Shopping on Your NOOK
- Using B&N Readouts™
- Using Your NOOK in a Barnes & Noble Store
- Searching Your NOOK
- Configuring Your NOOK
- Using Your NOOK at Wi-Fi Hotspots
- Updating the Software on Your NOOK
- Tips and Troubleshooting
- Appendix A: Page Numbering and File Formats
- Appendix B: International Use and Languages
- Appendix C: One Year Limited Warranty
- Appendix D: Trademarks
- Appendix E: FCC Notices
- Appendix F: Industry Canada Notice
- Appendix G: Terms of Service
- Appendix H: AT&T Terms of Service & Acceptable Use Policy
ItisCustomer’sresponsibilitytoensurethesecurityofitsnetworkandthe
machinesthatconnecttoanduseIPService(s).Youareresponsiblefor
configuringandsecuringyourservicestopreventdamagetotheAT&Tnetwork
and/orthedisruptionofService(s)toothercustomers,andensuringthatyour
customersandusersusetheService(s)inanappropriatemanner.Customeris
requiredtotakeallnecessarystepstomanagetheuseoftheIPService(s)insuch
amannerthatnetworkabuseispreventedorminimizedtothegreatestextent
possible.ItisCustomer’sresponsibilitytotakecorrectiveactionsonvulnerable
orexploitedsystemstopreventcontin-uedabuse.Violationsofsystemor
networksecurityareprohibitedandmayresultincriminaland/orcivilliability.
AT&TIPServicesmaynotbeusedtointerferewith,togainunauthorizedaccess
to,orotherwiseviolatethesecurityofAT&T’soran-otherparty’sserver,
network,personalcomputer,networkaccessorcontroldevices,softwareordata,
orothersystem,ortoat-tempttodoanyoftheforegoing.Examplesofviolations
ofsystemornetworksecurityincludebutarenotlimitedto:
intercepting,interferingwithorredirectinge-mailintendedforthirdparties,
oranyformofnetworkmonitoring,scanningorprobing,orotheractionfor
theunauthorizedinterceptionofdataorharvestingofe-mailaddresses;
hacking-attemptingtoattack,breach,circumventortestthevulnerability
oftheuserauthenticationorsecurityofanyhost,network,server,personal
computer,networkaccessandcontroldevices,softwareordatawithout
expressauthorizationoftheownerofthesystemornetwork;
impersonatingothersinordertoobtainanotheruser’saccountpasswordor
otherpersonalinformation.
usingtheIPService(s)todeliverspyware,orsecretlyordeceptivelyobtain
thepersonalinformationofthirdparties(phishing,etc.),orengagein
modemhi-jacking;
usinganyprogram,file,script,commandorthetransmissionofany
messageorcontentofanykind,designedtointerferewithaterminal
sessionortheaccessoruseoftheInternetoranyothermeansof
communication;
distributingorusingtoolsdesignedtocompromisesecurity,including
crackingtools,passwordguessingprograms,packetsniffersornetwork
probingtools(exceptinthecaseofauthorizedlegitimatenetworksecurity
operations);










