Results 41 to 50 of 1,045 | « previous | next »
- Firewalls don't stop dragons : a step-by-step guide to computer security and privacy for non-techies / by Parker, Carey,author.;
- Includes bibliographical references and index.Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people--though even technically savvy readers will find many useful tips here. This book contains everything you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Protecting your digital domain is much like defending a medieval castle. Wide moats, towering walls and trained guards provide defense in depth, safeguarding the people and property within against the most common threats. But attempting to dragon-proof your castle would be counterproductive and costly. The goal of this book is to keep your devices and data safe from the most likely and impactful hazards--not a targeted attack by the NSA. Like wearing seat belts and sunscreen in the real world, there are dozens of simple, effective precautions we need to take in the virtual world. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what you need to do, each chapter includes a detailed checklist of expert tips. But the book also explains why you need to do these things, using entertaining analogies and straightforward explanations.
- Subjects: Computer security.; Data protection.;
- The defender's dilemma : charting a course toward cybersecurity / by Libicki, Martin C.,author.(CARDINAL)771876; Ablon, Lillian,author.(CARDINAL)614969; Webb, Tim(Engineer),author.(CARDINAL)620951; Rand Corporation,publisher.(CARDINAL)137141; Rand Corporation.National Security Research Division.(CARDINAL)528204;
- Includes bibliographical references (pages 127-135)Introduction. -- Chief information security officers surveyed. -- The efficacy of security systems. -- Improving software. -- A heuristic cybersecurity model. -- Lessons for organizations and public policy. -- Appendixes.Cybersecurity is a constant, and, by all accounts growing, challenge. Although software products are gradually becoming more secure and novel approaches to cybersecurity are being developed, hackers are becoming more adept, their tools are better, and their markets are flourishing. The rising tide of network intrusions has focused organizations' attention on how to protect themselves better. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures, and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses. A heuristic model was developed to demonstrate the various cybersecurity levers that organizations can control, as well as exogenous factors that organizations cannot control. Among the report's findings were that cybersecurity experts are at least as focused on preserving their organizations' reputations as protecting actual property. Researchers also found that organizational size and software quality play significant roles in the strategies that defenders may adopt. Finally, those who secure networks will have to pay increasing attention to the role that smart devices might otherwise play in allowing hackers in. Organizations could benefit from better understanding their risk posture from various actors (threats), protection needs (vulnerabilities), and assets (impact). Policy recommendations include better defining the role of government, and exploring information sharing responsibilities.
- Subjects: Computer security.; Computer networks; Computer software;
- Tor and the dark art of anonymity / by Henderson, Lance.;
- "The NSA hates Tor. So does the FBI. Even Google wants it gone, as do Facebook and Yahoo and every other soul-draining, identity-tracking vampiric media cartel that scans your emails and spies on your private browsing sessions to better target you. But there's hope. This manual will give you the incognito tools that will make you a master of anonymity! Other books tell you to install Tor and then encrypt your hard drive... and leave it at that. I go much deeper, delving into the very engine of ultimate network security, taking it to an art form where you'll receive a new darknet persona - how to be anonymous online without looking like you're trying to be anonymous online. Covered in Tor: - Browse the Internet Anonymously - Darkcoins, Darknet Marketplaces & Opsec Requirements - Tor Hidden Servers - How to Not Get Caught - Counter-Forensics the FBI Doesn't Want You to Know About - Windows vs. Linux - Which Offers Stronger Network Security? - Cryptocurrency (Real Bitcoin Anonymity) - Supercookies & Encryption - Preventing Marketers and Debt Collectors From Finding You - How to Protect Your Assets - i.e., How to Be Invisible and even Hide from the Internet itself! - How to Hide Anything Scroll back up and click "Look Inside" and Take Back Your Life Today"--From the Publisher.
- Subjects: Computer security.; Data encryption (Computer science);
- Cybersecurity all-in-one / by Steinberg, Joseph(Cybersecurity expert),author.; Beaver, Kevin,author.(CARDINAL)673284; Coombs, Ted,author.(CARDINAL)856835; Winkler, Ira,author.(CARDINAL)641368;
- "Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems--and explains why doing so is more important now than ever. Dig in for info on what kind of risks are out there, how to protect a variety of devices, strategies for testing your security, securing cloud data, and steps for creating an awareness program in an organization"--Cybersecurity basics -- Personal cybersecurity -- Securing a business -- Securing the Cloud -- Testing your security -- Enhancing cybersecurity awareness.
- Subjects: Computer security.; Computer networks;
- Cybersecurity / by Steinberg, Joseph(Cybersecurity expert),author.;
- Introduction -- Part 1: Getting started with cybersecurity. What exactly is cybersecurity? ; Getting to know common cyberattacks ; The bad guys you must defend against -- Part 2: Improving your own personal security. Evaluating your current cybersecurity posture ; Enhancing physical security ; Cybersecurity considerations when working from home -- Part 3: Protecting yourself from yourself. Securing your accounts ; Passwords ; Preventing social engineering attacks -- Part 4: Cybersecurity for businesses, organizations, and government. Securing your small business ; Cybersecurity and big businesses -- Part 5: Handling a security incident (this is a when, not an if). Identifying a security breach ; Recovering from a security breach -- Part 6: Backing up and recovery. Backing up ; Resetting your device ; Restoring from backups -- Part 7: Looking toward the future. Pursuing a cybersecurity career ; Emerging technologies bring new threats -- Part 8: The part of tens. Ten ways to improve your cybersecurity without spending a fortune ; Ten (or so) lessons from major cybersecurity breaches ; 1Ten ways to safely use public wi-fi."Every day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is that we can all be cybersecure--and it doesn't take a degree in computer science to make it happen! Cybersecurity For Dummies is the down-to-earth guide you need to secure your own data (and your company's, too). You'll get step-by-step guidance on how to implement reasonable security measures, prevent cyber attacks, deal securely with remote work, and what to do in the event that your information is compromised."--
- Subjects: Handbooks and manuals.; Computer security.; Computer networks;
- How cybersecurity really works : a hands-on guide for total beginners / by Grubb, Sam(Cyber security consultant),author.;
- An Introduction to Cybersecurity -- How Black Hats Use the Internet -- How Black Hats Use Phishing to Trick You -- How Black Hats Use Malware to Infect Your Computer -- How Black Hats Access Your Accounts -- How Black Hats Tap Your Wires -- How Black Hats Attack the Cloud -- How Black Hats Pirate Your Wireless Internet -- How Black Hats Break Encryption -- How to Stop Black Hats."An introduction to cybersecurity for readers new to the field. It covers the fundamentals of cybersecurity and shares practical advice on how readers can keep themselves and their computers safe from phishing, malware, network attacks, and other hacker exploits. Provides real-world examples"--
- Subjects: Handbooks and manuals.; Instructional and educational works.; Computer security.; Computer crimes; Computer networks;
- Protecting financial data / by Hulick, Kathryn,author.(CARDINAL)405863;
- Includes bibliographical references (pages 104-108) and index.The victim of an invisible attack -- What is at risk? -- Know the safeguards -- Play your part -- Spy games -- Hackers attack -- Imposters on the prowl -- Life after losing financial data.1060L
- Subjects: Young adult literature.; Young adult literature.; Data protection.; Computer security.; Computer crimes;
- Ciberseguridad : protege to identidad y tus datos / by Kamberg, Mary-Lane,1948-author.(CARDINAL)389476; Jiménez Rioja, Alberto,translator.(CARDINAL)663472;
- Includes bibliographical references and index."Internet security breaches have been in the news of late. Organizations, governments, businesses, and individual internet users are all at risk. This book introduces readers to the importance of cybersecurity and addresses the current risks from hackers, viruses and other malware, identity thieves, and other online perils. It provides concrete measures that young digital natives can take to protect themselves and their computers, smartphones, and other devices. This volume's lively, cautionary narrative and useful tips will help readers effectively defend their identities and data."--from English edition.Héroes y villanos -- Virus, troyanos y gusanos -- Prevención y cura -- Malos personajes -- Vigilantes mundiales.Grade 5-8.
- Subjects: Computer security.; Computer networks;
- Cyberphobia : identity, trust, security and the Internet / by Lucas, Edward,1962-author.(CARDINAL)556495;
- Includes bibliographical references (pages 277-298) and index.Meet the Hakhetts -- The unreliability of computers -- Identity and its enemies -- Collateral damage -- The geopolitics of the Internet -- Spies v warriors -- The spy in your pocket -- The danger of monoculture -- Clearing the jungle -- Passwords unscrambled -- Identity politics -- Turning the tables."Lucas [examines the cybercrime] confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the Internet, it might as well be the Wild West. Standards of securing our computers and other Internet-connected technology are diverse, but just like the rules of the road meant to protect both individual drivers and everyone else driving alongside them, weak cybersecurity on the computers and Internet systems near us put everyone at risk"--Dust jacket flap.
- Subjects: Computer crimes.; Computer security.; Internet.;
- Online danger : how to protect yourself and your loved ones from the evil side of the internet / by Cole, Eric,author.(CARDINAL)222723;
- The new world order -- The realities of cyberspace -- Secrets and lies -- Losers, slime balls, forlorn lovers, and predators -- You are the target -- Smile, you're being recorded! Permanently. -- Childproofing cyberspace (for kids and adults) -- Digital convergence or digital divide? -- Is it time to become Amish? -- Safety in a digital world.Cyberspace is an informative, fun, and educational place for the entire family, but danger lurks everywhere you turn online. From phishing to cyber bullying to identity theft, there are a myriad of ways that you and your loved ones could be harmed online, often with irreparable damage. Fortunately, there are precautions that everyone can take to protect themselves, their families, and their businesses that don't require advanced (or even any) technical knowledge. In this book, cyber security expert, Dr. Eric Cole, provides a layman's look at how to protect yourself online. Dr. Cole makes the case that everyone is a potential target, not just the rich and famous. And we all have the ability to make it more difficult for cyber criminals to make us their next victim. He explains in plain language how to make your computer safer, protect your email, and guard your online accounts. --
- Subjects: Computer security.; Internet;
Results 41 to 50 of 1,045 | « previous | next »