Understanding security issues

With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercrim...

Celý popis

Uloženo v:
Podrobná bibliografie
Hlavní autoři: Donaldson, Scott, Williams, Chris, Siegel, Stanley
Médium: E-kniha Kniha
Jazyk:angličtina
Vydáno: Berlin Walter de Gruyter 2018
De|G Press
DEG Press
De Gruyter
Vydání:1
Témata:
ISBN:1501515233, 9781501515231, 1501506366, 9781501506369
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Obsah:
  • Intro -- About DeG PRESS -- Acknowledgments -- About the Authors -- Contents -- Introduction -- Chapter 1. Security Mindset -- Chapter 2. Common Cybersecurity Attacks -- Chapter 3. Protecting Your Computer(s) -- Chapter 4. Protecting Your Passwords -- Chapter 5. Protecting Your Home Network -- Chapter 6. Smartphones and Tablets -- Chapter 7. Protecting Your Web Browsing -- Chapter 8. Protecting Your E-Mail and Phone Calls -- Chapter 9. Protecting Your Identity, Privacy, and Family Online -- Chapter 10. Protecting Yourself on Travel -- Chapter 11. When Things Go Wrong -- Chapter 12. Considering Cybersecurity at Work -- Chapter 13. Final Thoughts -- Appendix A. Common Online Scams -- Appendix B. The Worst Passwords Ever -- Appendix C. Online Security Resources -- Glossary -- Index
  • Acknowledgments --
  • Chapter 7. Protecting Your Web Browsing --
  • Chapter 8. Protecting Your E-Mail and Phone Calls --
  • Contents --
  • Appendix C. Online Security Resources --
  • Appendix B. The Worst Passwords Ever --
  • Chapter 11. When Things Go Wrong --
  • About DeG PRESS --
  • Chapter 1. Security Mindset --
  • Chapter 4. Protecting Your Passwords --
  • Chapter 5. Protecting Your Home Network --
  • Index
  • Chapter 2. Common Cybersecurity Attacks --
  • Glossary --
  • Chapter 6. Smartphones and Tablets --
  • Chapter 13. Final Thoughts --
  • Appendix A. Common Online Scams --
  • Chapter 9. Protecting Your Identity, Privacy, and Family Online --
  • Chapter 10. Protecting Yourself on Travel --
  • Frontmatter --
  • About the Authors --
  • Chapter 3. Protecting Your Computer(s) --
  • Chapter 12. Considering Cybersecurity at Work --
  • Introduction --