Understanding security issues
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercrim...
Uloženo v:
| Hlavní autoři: | , , |
|---|---|
| Médium: | E-kniha Kniha |
| Jazyk: | angličtina |
| Vydáno: |
Berlin
Walter de Gruyter
2018
De|G Press DEG Press De Gruyter |
| Vydání: | 1 |
| Témata: | |
| ISBN: | 1501515233, 9781501515231, 1501506366, 9781501506369 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
Obsah:
- Intro -- About DeG PRESS -- Acknowledgments -- About the Authors -- Contents -- Introduction -- Chapter 1. Security Mindset -- Chapter 2. Common Cybersecurity Attacks -- Chapter 3. Protecting Your Computer(s) -- Chapter 4. Protecting Your Passwords -- Chapter 5. Protecting Your Home Network -- Chapter 6. Smartphones and Tablets -- Chapter 7. Protecting Your Web Browsing -- Chapter 8. Protecting Your E-Mail and Phone Calls -- Chapter 9. Protecting Your Identity, Privacy, and Family Online -- Chapter 10. Protecting Yourself on Travel -- Chapter 11. When Things Go Wrong -- Chapter 12. Considering Cybersecurity at Work -- Chapter 13. Final Thoughts -- Appendix A. Common Online Scams -- Appendix B. The Worst Passwords Ever -- Appendix C. Online Security Resources -- Glossary -- Index
- Acknowledgments --
- Chapter 7. Protecting Your Web Browsing --
- Chapter 8. Protecting Your E-Mail and Phone Calls --
- Contents --
- Appendix C. Online Security Resources --
- Appendix B. The Worst Passwords Ever --
- Chapter 11. When Things Go Wrong --
- About DeG PRESS --
- Chapter 1. Security Mindset --
- Chapter 4. Protecting Your Passwords --
- Chapter 5. Protecting Your Home Network --
- Index
- Chapter 2. Common Cybersecurity Attacks --
- Glossary --
- Chapter 6. Smartphones and Tablets --
- Chapter 13. Final Thoughts --
- Appendix A. Common Online Scams --
- Chapter 9. Protecting Your Identity, Privacy, and Family Online --
- Chapter 10. Protecting Yourself on Travel --
- Frontmatter --
- About the Authors --
- Chapter 3. Protecting Your Computer(s) --
- Chapter 12. Considering Cybersecurity at Work --
- Introduction --

