Cargando…

10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy /

In nontechnical language and engaging style, 10 Don'ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Bachrach, Daniel G. (Autor), Rzeszut, Eric J. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berkeley, CA : Apress, [2014]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn894509205
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 141105s2014 caua ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d YDXCP  |d OCLCO  |d GW5XE  |d N$T  |d UMI  |d COO  |d B24X7  |d FUG  |d IDEBK  |d DEBBG  |d E7B  |d EBLCP  |d OCLCQ  |d Z5A  |d LIV  |d MERUC  |d ESU  |d OCLCQ  |d VT2  |d IOG  |d OCLCA  |d REB  |d VLB  |d OCLCF  |d CEF  |d DEHBZ  |d OCLCQ  |d U3W  |d AU@  |d OCLCQ  |d WYU  |d YOU  |d UAB  |d UKAHL  |d DCT  |d ERF  |d OCLCQ  |d WURST  |d RCZ  |d ADU  |d OCLCQ  |d SNK  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 898043354  |a 908042116  |a 910911953  |a 1005837191  |a 1026437013  |a 1048130846  |a 1066633095  |a 1066662989  |a 1086515213  |a 1110807290  |a 1112539588  |a 1112804391  |a 1129349214  |a 1152978467  |a 1160059259  |a 1162749007  |a 1192339185  |a 1240511559 
020 |a 9781484203675  |q (electronic bk.) 
020 |a 1484203674  |q (electronic bk.) 
020 |a 1484203682  |q (print) 
020 |a 9781484203682  |q (print) 
020 |z 9781484203682 
024 7 |a 10.1007/978-1-4842-0367-5  |2 doi 
029 1 |a AU@  |b 000056028930 
029 1 |a CHNEW  |b 000890525 
029 1 |a CHVBK  |b 374492425 
029 1 |a DEBBG  |b BV042490411 
029 1 |a DEBBG  |b BV043617722 
029 1 |a DEBSZ  |b 434835900 
029 1 |a GBVCP  |b 882843109 
035 |a (OCoLC)894509205  |z (OCoLC)898043354  |z (OCoLC)908042116  |z (OCoLC)910911953  |z (OCoLC)1005837191  |z (OCoLC)1026437013  |z (OCoLC)1048130846  |z (OCoLC)1066633095  |z (OCoLC)1066662989  |z (OCoLC)1086515213  |z (OCoLC)1110807290  |z (OCoLC)1112539588  |z (OCoLC)1112804391  |z (OCoLC)1129349214  |z (OCoLC)1152978467  |z (OCoLC)1160059259  |z (OCoLC)1162749007  |z (OCoLC)1192339185  |z (OCoLC)1240511559 
037 |a CL0500000513  |b Safari Books Online 
050 4 |a QA76.9.A25  |b B33 2014 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a URY  |2 bicssc 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Bachrach, Daniel G.,  |e author. 
245 1 0 |a 10 don'ts on your digital devices :  |b the non-techie's survival guide to cyber security and privacy /  |c Daniel G. Bachrach, Eric J. Rzeszut. 
246 3 |a Ten don'ts on your digital devices 
264 1 |a Berkeley, CA :  |b Apress,  |c [2014] 
264 4 |c ©2014 
300 |a 1 online resource (xx, 180 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |b PDF 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed November 20, 2014). 
500 |a Includes index. 
520 |a In nontechnical language and engaging style, 10 Don'ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and phishing attacks and emerging threats that exploit cloud-based storage and mobile apps. It's a wonderful thing to be able to use any of your cloud-synced assortment of desktop, portable, mobile, and wearable computing devices to work from home, shop at work, pay in a store, do your banking from a coffee shop, submit your tax returns from the airport, or post your selfies from the Oscars. But with this new world of connectivity and convenience comes a host of new perils for the lazy, the greedy, the unwary, and the ignorant. The 10 Don'ts can't do much for the lazy and the greedy, but they can save the unwary and the ignorant a world of trouble. 10 Don'ts employs personal anecdotes and major news stories to illustrate what can--and all too often does--happen when users are careless with their devices and data. Each chapter describes a common type of blunder (one of the 10 Don'ts), reveals how it opens a particular port of entry to predatory incursions and privacy invasions, and details all the unpleasant consequences that may come from doing a Don't. The chapter then shows you how to diagnose and fix the resulting problems, how to undo or mitigate their costs, and how to protect against repetitions with specific software defenses and behavioral changes. Through ten vignettes told in accessible language and illustrated with helpful screenshots, 10 Don'ts teaches non-technical readers ten key lessons for protecting your digital security and privacy with the same care you reflexively give to your physical security and privacy, so that you don't get phished, give up your password, get lost in the cloud, look for a free lunch, do secure things from insecure places, let the snoops in, be careless when going mobile, use dinosaurs, or forget the physical--in short, so that you don't trust anyone over ... anything. Non-techie readers are not unsophisticated readers. They spend much of their waking lives on their devices and are bombarded with and alarmed by news stories of unimaginably huge data breaches, unimaginably sophisticated "advanced persistent threat" activities by criminal organizations and hostile nation-states, and unimaginably intrusive clandestine mass electronic surveillance and data mining sweeps by corporations, data brokers, and the various intelligence and law enforcement arms of our own governments. The authors lift the veil on these shadowy realms, show how the little guy is affected, and what individuals can do to shield themselves from big predators and snoops 
504 |a Includes bibliographical references and index. 
505 0 |a Introduction; Chapter 1: Don't Get Phished; A Closer Look at "Phishing"; "Target"-ed Phishing; Other Forms; What Should You Do?; Additional Reading; Chapter 2: Don't Give Up Your Passwords; Where Did Passwords Come From?; Password Threats and New Solutions; Alternatives to the "Simple" Password: Biometrics and Two-Factor Authentication; Bigger Can Be Better. . .; Mix It Up; Protecting Passwords; What Should You Do?; Additional Reading; Chapter 3: Don't Get Lost in "The Cloud "; What Is "The Cloud"?; Cloud Controversy and Risks; Formalizing an Informal Relationship; Data Breaches. 
505 8 |a Not Just for Storage AnymoreReliability; Accessibility; What Should You Do?; Additional Reading; Chapter 4: Don't Look for a Free Lunch; Software-Consider the Source; Issues with Warez; Hidden Agenda; Lesser Threats; How to Protect Yourself; Additional Reading; Chapter 5: Don't Do Secure Things from Insecure Places; Background: Wireless Networking at Home, at Work, and on the Road; Home Sweet Home. . .; Back at the Office. . .; On the Road Again. . .; Encryption Standards; VPN; Workplace Security, on the Road; Extra Layers of Protection; Other Uses for VPNs; Additional Reading. 
505 8 |a Chapter 6: Don't Let the Snoops InWho Are the "Snoops"?; Boundless Informant; PRISM; Tempora; MUSCULAR; FASCIA; Dishfire; Optic Nerve; So, Who Else Is Snooping?; For-Profit Corporations; Employers; Where Your Data Are ... ; Data on the Move; Taking an Active Role in Protecting Your Data; Data at Rest; Additional Reading; Chapter 7: Don't Be Careless with Your Phone; Mobility in the 21st Century; When It's the Employee's Device, but the Company's Resources-BYOD; When It's the Company's Device, but Used at the Employee's Discretion-COPE; Know Your Rights; Physically Securing Your Phone. 
505 8 |a Start Me Up-but Not Without a PasswordWhen a Password Isn't Enough; Losing (and Finding!) the Key to Your Digital Life; Mobile Law; Insecure Background Wireless Networks; Don't Trust a Wireless Network Based on Its Name; Don't Trust Your Phone to Connect for You; Bluetooth Hacking; Malware Apps; Operating System Updates; Additional Reading; Chapter 8: Don't Use Dinosaurs; Software: It Has an Expiration Date; The "Good Old Days" of Software; New Software for a New Era; Don't Forget About Mobile Apps; Windows XP; Not Just Windows; Not Just Operating Systems; Not Just Desktops and Laptops. 
505 8 |a What Can You Do?Additional Reading; Chapter 9: Don't Trust Anyone Over ... Anything; What Is Social Engineering?; Keep Your Eye on the Ball; Hooking the Phish; Social Engineering via Social Networking; Knowledge Is Power; Big Companies, Big Problems; Ransomware; In-Person Tricks; Not Your Mother's Kind of Tailgating; How to Combat Social Engineering; Additional Reading; Chapter 10: Don't Forget the Physical; Physical Security: An Overview; Physical Security at Home; Letting Outsiders In; Removing Temptation; Don't Blanket the Neighborhood with Wi-Fi; Physical Security at Work. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Mobile computing  |x Security measures. 
650 0 |a Data protection. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Informatique mobile  |x Sécurité  |x Mesures. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Data protection  |2 fast 
653 0 0 |a computerwetenschappen 
653 0 0 |a computer sciences 
653 0 0 |a gegevensbeheer 
653 0 0 |a data management 
653 1 0 |a Information and Communication Technology (General) 
653 1 0 |a Informatie- en communicatietechnologie (algemeen) 
700 1 |a Rzeszut, Eric J.,  |e author. 
776 0 8 |i Printed edition:  |z 9781484203682 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484203675/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH29396332 
938 |a Books 24x7  |b B247  |n bks00073937 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1964915 
938 |a ebrary  |b EBRY  |n ebr10969094 
938 |a EBSCOhost  |b EBSC  |n 880406 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis30038665 
938 |a YBP Library Services  |b YANK  |n 12143253 
994 |a 92  |b IZTAP