|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
JSTOR_on1013179292 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
171129t20172017enka ob 000 0 eng d |
040 |
|
|
|a YDX
|b eng
|e rda
|e pn
|c YDX
|d JSTOR
|d EBLCP
|d OCLCA
|d OCLCF
|d UMI
|d TOH
|d STF
|d MERUC
|d TEFOD
|d OH1
|d IDB
|d EZ9
|d COO
|d UOK
|d CEF
|d WAU
|d KSU
|d DEBBG
|d UAB
|d OCLCQ
|d G3B
|d LVT
|d S9I
|d C6I
|d N$T
|d K6U
|d D6H
|d IGB
|d VLB
|d OCLCQ
|d MM9
|d OCLCQ
|d OCLCO
|d LUU
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1017989975
|
020 |
|
|
|a 184928962X
|q (electronic book)
|
020 |
|
|
|a 9781849289627
|q (electronic bk.)
|
020 |
|
|
|z 9781849289610
|q (softcover)
|
020 |
|
|
|z 1849289611
|q (softcover)
|
029 |
1 |
|
|a AU@
|b 000062554693
|
029 |
1 |
|
|a AU@
|b 000065313114
|
029 |
1 |
|
|a AU@
|b 000067091270
|
029 |
1 |
|
|a CHNEW
|b 000986764
|
029 |
1 |
|
|a CHVBK
|b 50939681X
|
029 |
1 |
|
|a GBVCP
|b 1014940982
|
035 |
|
|
|a (OCoLC)1013179292
|z (OCoLC)1017989975
|
037 |
|
|
|a 22573/ctt1wzz3vn
|b JSTOR
|
037 |
|
|
|a 91FB3A32-F39D-4EF8-8CE5-999436295FC4
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Day, Graham,
|e author.
|
245 |
1 |
0 |
|a Security in the digital world :
|b for the home user, parent, consumer and home office /
|c Graham Day.
|
264 |
|
1 |
|a Ely, Cambridgeshire, UK :
|b IT Governance Publishing,
|c [2017]
|
264 |
|
4 |
|c ©2017
|
300 |
|
|
|a 1 online resource (213 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a Introduction -- 1. The internet -- 2. The threats -- 3. The how -- 4. Operating system : computers and laptops -- 5. Home office -- 6. Mobile security -- 7. Smartphones and tablets -- 8. Consumers -- 9. Personal and consumer rights -- 10. Internet of things (IoT) -- 11. Social networking security -- 12. Parental security -- 13. Resilience -- 14. Personal cyber security risk assessment -- ITG resources.
|
520 |
|
|
|a "This must-have guide features simple explanations, examples and advice to help you be security-aware online in the digital age. Learn how to: Keep your information secure; Put the necessary controls on your home network, protecting your family from cyber crime; Prevent identity theft when shopping online or using contactless payment; Keep your children safe when using the Internet."--
|c Provided by publisher
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt1x07wx5
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL5211340
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1643203
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15005151
|
994 |
|
|
|a 92
|b IZTAP
|