libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

jacobson douglas; idziorek joseph - computer security literacy
Zoom

Computer Security Literacy Staying Safe in a Digital World

;




Disponibilità: Normalmente disponibile in 20 giorni
A causa di problematiche nell'approvvigionamento legate alla Brexit sono possibili ritardi nelle consegne.


PREZZO
64,98 €
NICEPRICE
61,73 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Pubblicazione: 01/2013
Edizione: 1° edizione





Note Editore

Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practical security topics that users are likely to encounter on a regular basis. Written for nontechnical readers, the book provides context to routine computing tasks so that readers better understand the function and impact of security in everyday life. The authors offer practical computer security knowledge on a range of topics, including social engineering, email, and online shopping, and present best practices pertaining to passwords, wireless networks, and suspicious emails. They also explain how security mechanisms, such as antivirus software and firewalls, protect against the threats of hackers and malware. While information technology has become interwoven into almost every aspect of daily life, many computer users do not have practical computer security knowledge. This hands-on, in-depth guide helps anyone interested in information technology to better understand the practical aspects of computer security and successfully navigate the dangers of the digital world.




Sommario

What Is Information Security? Introduction How Much of Our Daily Lives Relies on Computers? Security Truisms Basic Security Terminology Cyber Ethics The Perception of Security Threat ModelSecurity Is a Multidisciplinary Topic Introduction to Computers and the Internet Introduction ComputersOperation of a ComputerOverview of the InternetComputers and the Internet Security Role-Playing Characters Passwords under Attack Introduction Authentication Process Password ThreatsStrong PasswordsPassword Management: Let’s Be Practical Email Security Introduction Email SystemsEmail Security and Privacy Malware: The Dark Side of Software Introduction What Is Malware? How Do I Get Malware?What Does Malware Do? Malware: Defense in Depth Introduction Data Backup FirewallsSoftware PatchesAntivirus SoftwareUser Education Securely Surfing the World Wide Web Introduction Web Browser"HTTP Secure" Web Browser History Online Shopping IntroductionConsumer DecisionsSpyware and Key-Loggers Wireless Sniffing Scams and Phishing Websites Misuse and Exposure of Information Wireless Internet Security Introduction How Wireless Networks Work Wireless Security Threats Public Wi-Fi Security Wireless Network Administration Social Networking Introduction Choose Your Friends WiselyInformation SharingMalware and Phishing Social Engineering: Phishing for Suckers Introduction Social Engineering: Malware DistributionPhishingDetecting a Phishing URLApplication of Knowledge Staying Safe Online: The Human Threat Introduction The Differences between Cyberspace and the Physical World Consider the Context: Watch What You Say and How It Is Communicated What You Do on the Internet Lasts Forever Nothing Is Private, Now or in the Future Can You Really Tell Who You Are Talking with? Cameras and Photo Sharing I Am a Good Person, That Would Never Happen to Me Is There Anything I Can Do to Make the Internet a Safer Place for My Child? Case Studies Introduction Unable to Remove Malware: Help! Securely Handling Suspicious Email Attachments Recovering from a Phishing AttackEmail Account Hacked? Now What? Smart Phones and Malware Hey! You! Get off My Wireless Network Bad Breakup? Sever Your Digital Ties "Display Images Below"? The Meaning behind the Question Phishing Email Forensics It’s on the Internet, So It Must Be True Buying and Selling Online Moving Forward with Security and Book Summary Introduction After the Completion of the Book Defense-in-Depth TasksChapter Summaries Glossary Appendix A: Reading ListAppendix B: Basics of CryptographyAppendix C: Web Surfing Security Technologies A Summary and Bibliography appear at the end of each chapter.










Altre Informazioni

ISBN:

9781439856185

Condizione: Nuovo
Dimensioni: 9.25 x 6.25 in Ø 1.55 lb
Formato: Brossura
Illustration Notes:186 b/w images
Pagine Arabe: 368


Dicono di noi