Understanding security issues
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercrim...
Uložené v:
| Hlavní autori: | , , |
|---|---|
| Médium: | E-kniha Kniha |
| Jazyk: | English |
| Vydavateľské údaje: |
Berlin
Walter de Gruyter
2018
De|G Press DEG Press De Gruyter |
| Vydanie: | 1 |
| Predmet: | |
| ISBN: | 1501515233, 9781501515231, 1501506366, 9781501506369 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
Obsah:
- Intro -- About DeG PRESS -- Acknowledgments -- About the Authors -- Contents -- Introduction -- Chapter 1. Security Mindset -- Chapter 2. Common Cybersecurity Attacks -- Chapter 3. Protecting Your Computer(s) -- Chapter 4. Protecting Your Passwords -- Chapter 5. Protecting Your Home Network -- Chapter 6. Smartphones and Tablets -- Chapter 7. Protecting Your Web Browsing -- Chapter 8. Protecting Your E-Mail and Phone Calls -- Chapter 9. Protecting Your Identity, Privacy, and Family Online -- Chapter 10. Protecting Yourself on Travel -- Chapter 11. When Things Go Wrong -- Chapter 12. Considering Cybersecurity at Work -- Chapter 13. Final Thoughts -- Appendix A. Common Online Scams -- Appendix B. The Worst Passwords Ever -- Appendix C. Online Security Resources -- Glossary -- Index
- Acknowledgments --
- Chapter 7. Protecting Your Web Browsing --
- Chapter 8. Protecting Your E-Mail and Phone Calls --
- Contents --
- Appendix C. Online Security Resources --
- Appendix B. The Worst Passwords Ever --
- Chapter 11. When Things Go Wrong --
- About DeG PRESS --
- Chapter 1. Security Mindset --
- Chapter 4. Protecting Your Passwords --
- Chapter 5. Protecting Your Home Network --
- Index
- Chapter 2. Common Cybersecurity Attacks --
- Glossary --
- Chapter 6. Smartphones and Tablets --
- Chapter 13. Final Thoughts --
- Appendix A. Common Online Scams --
- Chapter 9. Protecting Your Identity, Privacy, and Family Online --
- Chapter 10. Protecting Yourself on Travel --
- Frontmatter --
- About the Authors --
- Chapter 3. Protecting Your Computer(s) --
- Chapter 12. Considering Cybersecurity at Work --
- Introduction --

