|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1195710043 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
200916s2020 nyua ob 001 0 eng d |
040 |
|
|
|a YDX
|b eng
|e rda
|e pn
|c YDX
|d N$T
|d YDXIT
|d GW5XE
|d AU@
|d EBLCP
|d LQU
|d UPM
|d TEF
|d OCLCF
|d UKMGB
|d UMI
|d OCLCQ
|d OCLCO
|d SNK
|d DST
|d OCLCQ
|d TOH
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBC0H5288
|2 bnb
|
016 |
7 |
|
|a 019940767
|2 Uk
|
019 |
|
|
|a 1196255166
|a 1197837546
|a 1198388512
|a 1201353070
|a 1206388713
|a 1300530534
|a 1303311804
|
020 |
|
|
|a 9781484261897
|q (electronic book)
|
020 |
|
|
|a 1484261895
|q (electronic book)
|
020 |
|
|
|z 1484261887
|
020 |
|
|
|z 9781484261880
|
024 |
7 |
|
|a 10.1007/978-1-4842-6189-7
|2 doi
|
024 |
8 |
|
|a 10.1007/978-1-4842-6
|
029 |
1 |
|
|a AU@
|b 000068068513
|
029 |
1 |
|
|a AU@
|b 000068073258
|
029 |
1 |
|
|a AU@
|b 000068655972
|
029 |
1 |
|
|a AU@
|b 000068846068
|
029 |
1 |
|
|a UKMGB
|b 019940767
|
035 |
|
|
|a (OCoLC)1195710043
|z (OCoLC)1196255166
|z (OCoLC)1197837546
|z (OCoLC)1198388512
|z (OCoLC)1201353070
|z (OCoLC)1206388713
|z (OCoLC)1300530534
|z (OCoLC)1303311804
|
037 |
|
|
|a com.springer.onix.9781484261897
|b Springer Nature
|
050 |
|
4 |
|a QA76.9.A25
|b P37 2020
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Parker, Carey,
|e author.
|
245 |
1 |
0 |
|a Firewalls don't stop dragons :
|b a step-by-step guide to computer security for non-techies /
|c Carey Parker.
|
246 |
3 |
|
|a Firewalls do not stop dragons
|
250 |
|
|
|a Fourth edition.
|
264 |
|
1 |
|a [New York, NY] :
|b Apress,
|c [2020]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Online resource; title from digital title page (viewed on October 28, 2020).
|
520 |
|
|
|a Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't know. Computers and the Internet have revolutionized the modern world, but if you are like most people, you have no clue how these things work and don't know the real threats. Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you would go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it is about arming yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data-just like wearing a seat belt, installing smoke alarms, and putting on sunscreen. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. This revised and expanded fourth edition contains more than 170 tips to make you and your family safer. It includes: Updates for Windows 10 (May 2020) and Mac OS 10.15 (Catalina) Updates for iOS 13 and Android 10 Updated recommendations on the best apps, products, and services More than 170 tips with complete step-by-step instructions and pictures A preview of Mac OS 11 Big Sur and iOS 14 What You Will Learn Create killer passwords that you do not have to remember Browse the web safely and with confidence Protect your data and reclaim your privacy Shop and bank online with maximum security Defend against identity theft Protect yourself from viruses and scams Maximize your smartphone security and privacy Safeguard your children online Block online tracking and dangerous ads Send files and messages securely and privately Set up secure home networking Keep your smart devices from spying on you Stop oversharing on social media Create automated backups of all your devices Learn how the Internet actually works And more! Who This Book Is For Those who use computers and mobile devices, but do not know (or care) how they work. The book is for people who want to know what they need to do to protect themselves-step by step, without judgment, and wit ...
|
542 |
|
|
|f © Copyright 2020 Carey Parker.
|g 2020
|
505 |
0 |
|
|a Chapter 1: Before We Begin -- Chapter 2: Cybersecurity 101 -- Chapter 3: First Things First -- Chapter 4: Passwords -- Chapter 5: Computer Security -- Chapter 6: Lan Sweet Lan -- Chapter 7: Practice Safe Surfing -- Chapter 8: Secure Communication -- Chapter 9: Online Accounts and Social Media -- Chapter 10: Parental Guidance -- Chapter 11: Dont Be a Smart Phone Dummy -- Chapter 12: Odds and Ends -- Chapter 13: Parting Thoughts -- Chapter 14: Glossary.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Firewalls (Computer security)
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Coupe-feu (Sécurité informatique)
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Firewalls (Computer security)
|2 fast
|
776 |
0 |
8 |
|i Print version:
|z 1484261887
|z 9781484261880
|w (OCoLC)1159163610
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781484261897/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6348634
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2619926
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 301531481
|
994 |
|
|
|a 92
|b IZTAP
|