Cargando…

Personal cybersecurity : how to avoid and recover from cybercrime /

"Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. Personal Cybersecurity addresses the needs of individual users at w...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Waschke, Marvin (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Bellingham, Washington : Apress, [2017]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn968706017
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 170116t20172017wau ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d IDEBK  |d EBLCP  |d GW5XE  |d N$T  |d YDX  |d OCLCF  |d UAB  |d UMI  |d NJR  |d COO  |d WAU  |d UPM  |d AZU  |d S4S  |d IOG  |d MERER  |d ESU  |d Z5A  |d VT2  |d OCLCQ  |d JBG  |d IAD  |d ICW  |d ICN  |d OTZ  |d K6U  |d OCLCQ  |d MERUC  |d LIV  |d OCLCQ  |d TEFOD  |d IDB  |d U3W  |d OCLCA  |d D6H  |d CAUOI  |d VVB  |d CEF  |d KSU  |d DEBBG  |d UWW  |d AU@  |d WYU  |d UKMGB  |d AUD  |d LEAUB  |d STF  |d UKAHL  |d CNCEN  |d G3B  |d ERF  |d UKBTH  |d UHL  |d OCLCQ  |d UBY  |d SRU  |d OCLCQ  |d BRF  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB913002  |2 bnb 
016 7 |a 019206066  |2 Uk 
019 |a 968918748  |a 971543460  |a 974651491  |a 981873818  |a 988654621  |a 1005772435  |a 1012056526  |a 1048190729  |a 1058508206  |a 1066446828  |a 1066474987  |a 1086467574  |a 1097146854  |a 1103263778 
020 |a 9781484224304  |q (electronic bk.) 
020 |a 1484224302  |q (electronic bk.) 
020 |z 9781484224298  |q (paperback) 
020 |z 1484224299  |q (paperback) 
024 7 |a 10.1007/978-1-4842-2430-4  |2 doi 
029 1 |a AU@  |b 000059569548 
029 1 |a AU@  |b 000061155758 
029 1 |a AU@  |b 000068984868 
029 1 |a CHNEW  |b 000946527 
029 1 |a CHVBK  |b 480271380 
029 1 |a GBVCP  |b 897166418 
029 1 |a UKMGB  |b 019206066 
035 |a (OCoLC)968706017  |z (OCoLC)968918748  |z (OCoLC)971543460  |z (OCoLC)974651491  |z (OCoLC)981873818  |z (OCoLC)988654621  |z (OCoLC)1005772435  |z (OCoLC)1012056526  |z (OCoLC)1048190729  |z (OCoLC)1058508206  |z (OCoLC)1066446828  |z (OCoLC)1066474987  |z (OCoLC)1086467574  |z (OCoLC)1097146854  |z (OCoLC)1103263778 
037 |a CL0500000828  |b Safari Books Online 
037 |a 26E438D5-F73A-4127-BB61-6A12FFBA21AF  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 060040  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Waschke, Marvin,  |e author. 
245 1 0 |a Personal cybersecurity :  |b how to avoid and recover from cybercrime /  |c Marvin Waschke. 
264 1 |a Bellingham, Washington :  |b Apress,  |c [2017] 
264 4 |c ©2017 
300 |a 1 online resource (240 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |b PDF 
504 |a Includes bibliographical references and index. 
505 0 |a 1. What's biting us? -- 2. Why is computer security so weak? -- 3. How does computer security work? -- 4. Your computer is a target -- 5. Misuse of computers -- 6. Cloud threats -- 7. Why doesn't somebody stop it? -- 8. What has the industry done? -- 9. Personal defense -- 10. Disaster recovery. 
520 |a "Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual users at risk are increasing in step with accelerating mutation rates of malware and cybercriminal delivery systems. Traditional anti-virus software and personal firewalls no longer suffice to guarantee personal security. Users who neglect to learn and adopt the new ways of protecting themselves in their work and private environments put themselves, their associates, and their companies at risk of inconvenience, violation, reputational damage, data corruption, data theft, system degradation, system destruction, financial harm, and criminal disaster. This book shows what actions to take to limit the harm and recover from the damage. Instead of laying down a code of "thou shalt not" rules that admit of too many exceptions and contingencies to be of much practical use, cloud expert Marvin Waschke equips you with the battlefield intelligence, strategic understanding, survival training, and proven tools you need to intelligently assess the security threats in your environment and most effectively secure yourself from attacks. Through instructive examples and scenarios, the author shows you how to adapt and apply best practices to your own particular circumstances, how to automate and routinize your personal cybersecurity, how to recognize security breaches and act swiftly to seal them, and how to recover losses and restore functionality when attacks succeed. What You'll Learn: Discover how computer security works and what it can protect us from ; See how a typical hacker attack works ; Evaluate computer security threats to the individual user and corporate systems ; Identify the critical vulnerabilities of a computer connected to the Internet ; Manage your computer to reduce vulnerabilities to yourself and your employer ; Discover how the adoption of newer forms of biometric authentication affects you ; Stop your router and other online devices from being co-opted into disruptive denial of service attacks. Who This Book Is For: Proficient and technically knowledgeable computer users who are anxious about cybercrime and want to understand the technology behind both attack and defense but do not want to go so far as to become security experts. Some of this audience will be purely home users, but many will be executives, technical managers, developers, and members of IT departments who need to adopt personal practices for their own safety and the protection of corporate systems. Many will want to impart good cybersecurity practices to their colleagues. IT departments tasked with indoctrinating their users with good safety practices may use the book as training material"--Provided by publisher 
588 0 |a Print version record. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |v Popular works. 
650 0 |a Internet  |x Security measures  |v Popular works. 
650 6 |a Sécurité informatique  |v Ouvrages de vulgarisation. 
650 6 |a Internet  |x Sécurité  |x Mesures  |v Ouvrages de vulgarisation. 
650 7 |a COMPUTERS  |x Security  |x Online Safety & Privacy.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
650 7 |a Internet  |x Security measures  |2 fast 
655 7 |a Popular works  |2 fast 
776 0 8 |i Print version:  |a Waschke, Marvin.  |t Personal cybersecurity.  |d Bellingham, Washington : Apress, [2017]  |z 1484224299  |w (OCoLC)960832855 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484224304/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH32563151 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4786848 
938 |a EBSCOhost  |b EBSC  |n 1452502 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis37360664 
938 |a YBP Library Services  |b YANK  |n 13372847 
994 |a 92  |b IZTAP