語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
到查詢結果
[ subject:"Internet- Security measures" ]
切換:
標籤
|
MARC模式
|
ISBD
Personal cybersecurity = how to avoi...
~
Waschke, Marvin.
FindBook
Google Book
Amazon
博客來
Personal cybersecurity = how to avoid and recover from cybercrime /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Personal cybersecurity/ by Marvin Waschke.
其他題名:
how to avoid and recover from cybercrime /
作者:
Waschke, Marvin.
出版者:
Berkeley, CA :Apress : : 2017.,
面頁冊數:
xiv, 240 p. :ill., digital ;24 cm.
內容註:
Chapter 1. What's Biting Us? -- Chapter 2. Why Is Computer Security So Weak? -- Chapter 3. How Does Computer Security Work? -- Chapter 4. Your Computer is a Target -- Chapter 5. Misuse of Computers -- Chapter 6. Cloud Threats -- Chapter 7. Why Doesn't Somebody Stop It? -- Chapter 8. What Has the Industry Done? -- Chapter 9. Personal Defense -- Chapter 10. Disaster Recovery.
Contained By:
Springer eBooks
標題:
Computer security - Popular works. -
電子資源:
http://dx.doi.org/10.1007/978-1-4842-2430-4
ISBN:
9781484224304
Personal cybersecurity = how to avoid and recover from cybercrime /
Waschke, Marvin.
Personal cybersecurity
how to avoid and recover from cybercrime /[electronic resource] :by Marvin Waschke. - Berkeley, CA :Apress :2017. - xiv, 240 p. :ill., digital ;24 cm.
Chapter 1. What's Biting Us? -- Chapter 2. Why Is Computer Security So Weak? -- Chapter 3. How Does Computer Security Work? -- Chapter 4. Your Computer is a Target -- Chapter 5. Misuse of Computers -- Chapter 6. Cloud Threats -- Chapter 7. Why Doesn't Somebody Stop It? -- Chapter 8. What Has the Industry Done? -- Chapter 9. Personal Defense -- Chapter 10. Disaster Recovery.
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual users at risk are increasing in step with accelerating mutation rates of malware and cybercriminal delivery systems. Traditional anti-virus software and personal firewalls no longer suffice to guarantee personal security. Users who neglect to learn and adopt the new ways of protecting themselves in their work and private environments put themselves, their associates, and their companies at risk of inconvenience, violation, reputational damage, data corruption, data theft, system degradation, system destruction, financial harm, and criminal disaster. This book shows what actions to take to limit the harm and recover from the damage. Instead of laying down a code of "thou shalt not" rules that admit of too many exceptions and contingencies to be of much practical use, cloud expert Marvin Waschke equips you with the battlefield intelligence, strategic understanding, survival training, and proven tools you need to intelligently assess the security threats in your environment and most effectively secure yourself from attacks. Through instructive examples and scenarios, the author shows you how to adapt and apply best practices to your own particular circumstances, how to automate and routinize your personal cybersecurity, how to recognize security breaches and act swiftly to seal them, and how to recover losses and restore functionality when attacks succeed. What You'll Learn Discover how computer security works and what it can protect us from See how a typical hacker attack works Evaluate computer security threats to the individual user and corporate systems Identify the critical vulnerabilities of a computer connected to the Internet Manage your computer to reduce vulnerabilities to yourself and your employer Discover how the adoption of newer forms of biometric authentication affects you Stop your router and other online devices from being co-opted into disruptive denial of service attacks Who This Book Is For Proficient and technically knowledgeable computer users who are anxious about cybercrime and want to understand the technology behind both attack and defense but do not want to go so far as to become security experts. Some of this audience will be purely home users, but many will be executives, technical managers, developers, and members of IT departments who need to adopt personal practices for their own safety and the protection of corporate systems. Many will want to impart good cybersecurity practices to their colleagues. IT departments tasked with indoctrinating their users with good safety practices may use the book as training material.
ISBN: 9781484224304
Standard No.: 10.1007/978-1-4842-2430-4doiSubjects--Topical Terms:
3220910
Computer security
--Popular works.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Personal cybersecurity = how to avoid and recover from cybercrime /
LDR
:04555nmm a2200289 a 4500
001
2089889
003
DE-He213
005
20170818090041.0
006
m d
007
cr nn 008maaau
008
171013s2017 cau s 0 eng d
020
$a
9781484224304
$q
(electronic bk.)
020
$a
9781484224298
$q
(paper)
024
7
$a
10.1007/978-1-4842-2430-4
$2
doi
035
$a
978-1-4842-2430-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
W312 2017
100
1
$a
Waschke, Marvin.
$3
2163243
245
1 0
$a
Personal cybersecurity
$h
[electronic resource] :
$b
how to avoid and recover from cybercrime /
$c
by Marvin Waschke.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2017.
300
$a
xiv, 240 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1. What's Biting Us? -- Chapter 2. Why Is Computer Security So Weak? -- Chapter 3. How Does Computer Security Work? -- Chapter 4. Your Computer is a Target -- Chapter 5. Misuse of Computers -- Chapter 6. Cloud Threats -- Chapter 7. Why Doesn't Somebody Stop It? -- Chapter 8. What Has the Industry Done? -- Chapter 9. Personal Defense -- Chapter 10. Disaster Recovery.
520
$a
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual users at risk are increasing in step with accelerating mutation rates of malware and cybercriminal delivery systems. Traditional anti-virus software and personal firewalls no longer suffice to guarantee personal security. Users who neglect to learn and adopt the new ways of protecting themselves in their work and private environments put themselves, their associates, and their companies at risk of inconvenience, violation, reputational damage, data corruption, data theft, system degradation, system destruction, financial harm, and criminal disaster. This book shows what actions to take to limit the harm and recover from the damage. Instead of laying down a code of "thou shalt not" rules that admit of too many exceptions and contingencies to be of much practical use, cloud expert Marvin Waschke equips you with the battlefield intelligence, strategic understanding, survival training, and proven tools you need to intelligently assess the security threats in your environment and most effectively secure yourself from attacks. Through instructive examples and scenarios, the author shows you how to adapt and apply best practices to your own particular circumstances, how to automate and routinize your personal cybersecurity, how to recognize security breaches and act swiftly to seal them, and how to recover losses and restore functionality when attacks succeed. What You'll Learn Discover how computer security works and what it can protect us from See how a typical hacker attack works Evaluate computer security threats to the individual user and corporate systems Identify the critical vulnerabilities of a computer connected to the Internet Manage your computer to reduce vulnerabilities to yourself and your employer Discover how the adoption of newer forms of biometric authentication affects you Stop your router and other online devices from being co-opted into disruptive denial of service attacks Who This Book Is For Proficient and technically knowledgeable computer users who are anxious about cybercrime and want to understand the technology behind both attack and defense but do not want to go so far as to become security experts. Some of this audience will be purely home users, but many will be executives, technical managers, developers, and members of IT departments who need to adopt personal practices for their own safety and the protection of corporate systems. Many will want to impart good cybersecurity practices to their colleagues. IT departments tasked with indoctrinating their users with good safety practices may use the book as training material.
650
0
$a
Computer security
$v
Popular works.
$3
3220910
650
0
$a
Internet
$x
Security measures
$v
Popular works.
$3
3220911
650
1 4
$a
Computer Science.
$3
626642
650
2 4
$a
Security.
$3
3134865
650
2 4
$a
Personal Computing.
$3
892741
650
2 4
$a
Systems and Data Security.
$3
898223
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-1-4842-2430-4
950
$a
Professional and Applied Computing (Springer-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9316061
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入