|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_ocn990741107 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
170617s2014 flu o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d YDX
|d MERUC
|d OCLCQ
|d OCLCO
|d OCLCQ
|d LOA
|d ZCU
|d S8J
|d DKC
|d CHVBK
|d OCLCO
|d OCLCF
|d OCLCQ
|d UEJ
|d JTB
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 990432075
|a 991482926
|a 991550385
|
020 |
|
|
|a 9781423223573
|
020 |
|
|
|a 1423223578
|
020 |
|
|
|z 9781423223566
|
029 |
1 |
|
|a AU@
|b 000066751120
|
029 |
1 |
|
|a CHNEW
|b 001039632
|
029 |
1 |
|
|a CHVBK
|b 55903296X
|
035 |
|
|
|a (OCoLC)990741107
|z (OCoLC)990432075
|z (OCoLC)991482926
|z (OCoLC)991550385
|
050 |
|
4 |
|a QA76.9.A25
|b .C936 2014
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
110 |
2 |
|
|a BarCharts, Inc.
|
245 |
1 |
0 |
|a Computer Security :
|b QuickStudy Reference Guide.
|
260 |
|
|
|a Boca Raton :
|b BarCharts, Inc.,
|c 2014.
|
300 |
|
|
|a 1 online resource (6 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Introduction; Using This Guide; Related Terminology; Threats; Malware; Related Terminology: Malware; Malware: Types; Malware: Website Infection; Social Engineering; Impersonation; Shoulder Surfing; Spam; Phishing; Characteristics of Phishing Scams; Examples of Phishing Scams; Prevention & Protection; Security Plan; Security Responsibilities; Security vs. Usability; Security Practices & Education; Safe Browsing Practices; Browser Settings; Email Practices; Login & Password Security; Software Installation Awareness; Software & Driver Updates; Update the Operating System.
|
505 |
8 |
|
|a Update Installed SoftwareUpdating Hardware Drivers; BIOS Updates; Antivirus; How to Choose; Basic Antivirus Features; Mid-Level Antivirus Features; Advanced Antivirus Features; Free or Paid; Network Security; Related Terminology: NetworkSecurity; Introduction to Networks; Wireless Networks (Wi-Fi) at Home; Public Security; Physical Device Security; Wireless Networks (Wi-Fi) in Public; Smart Surfing; Handling Especially Sensitive Data; Recovering a Stolen Device; How to Google; Additional Resources; Trustworthy Websites; Worth Noting.
|
520 |
|
|
|a Keep personal information safe from people who have malicious intent to steal, change or destroy it, prevent large-scale attacks on businesses and keep your computer running smoothly with the help of this handy guide that explains how "hackers" will attack and what you can do to protect yourself and your business. Topics covered include: *Terminology *Threats *Malware *Social Engineering *Prevention Protection *Security Plan *Security Practices Education *Software Driver Updates *Anti Virus *Network Security *Public Security. --Provided by publisher.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a BarCharts, Inc.
|t Computer Security : QuickStudy Reference Guide.
|d Boca Raton : BarCharts, Inc., ©2014
|z 9781423223566
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4876967
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL4876967
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14579618
|
994 |
|
|
|a 92
|b IZTAP
|