Ingyenes szállítás a Packetával, 19 990 Ft feletti vásárlás esetén
Posta 1 795 Ft DPD 1 995 Ft PostaPont / Csomagautomata 1 690 Ft Postán 1 690 Ft Packeta 990 Ft GLS futár 1 590 Ft GLS pont 1 390 Ft

Personal Cybersecurity

Nyelv AngolAngol
Könyv Puha kötésű
Könyv Personal Cybersecurity Marvin Waschke
Libristo kód: 15178128
Kiadó APress, január 2017
Discover the most prevalent cyber threats against individual users of all kinds of computing devices... Teljes leírás
? points 127 b
22 125 Ft -9 %
19 976 Ft
Beszállítói készleten Küldés 6-8 napon belül

30 nap a termék visszaküldésére


Ezt is ajánljuk


toplistás
Cyberpunk 2077 Piggyback / Puha kötésű
common.buy 8 237 Ft
Girl On Fire Empowerment Program Jenny Maria kierstead / Puha kötésű
common.buy 6 670 Ft
Today Tatiana Will Be a Princess Paula Croyle / Kemény kötésű
common.buy 5 741 Ft
Corruption and Misuse of Public Office COLIN; NICHOLLS QC / Kemény kötésű
common.buy 184 621 Ft
Geographie de Busching. Amerique Septentrionale Busching-A / Puha kötésű
common.buy 13 903 Ft
How I Became a Drifter Christmas Philip / Puha kötésű
common.buy 6 936 Ft

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. Learn the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. Personal Cybersecurity addresses the needs of individual users at work and for home use. This book for digitally literate non-expert users covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual users at risk are increasing in step with accelerating mutation rates of malware and cybercriminal delivery systems. Traditional anti-virus software and personal firewalls no longer suffice to guarantee personal security. Users who neglect to learn and adopt the new ways of protecting themselves in their work and private environments put themselves, their associates, and their companies at risk of inconvenience, violation, reputational damage, data corruption, data theft, system degradation, system destruction, financial harm, and criminal disaster. This book shows what actions to take to limit the harm and recover from the damage. Instead of laying down a code of "thou shalt not" rules that admit of too many exceptions and contingencies to be of much practical use, cloud expert Marvin Waschke equips his readers with the battlefield intelligence, strategic understanding, survival training, and proven tools they need to intelligently assess the security threats in their environments and most effectively secure themselves from attacks. Through instructive examples and scenarios, the author shows users how to adapt and apply best practices to their own particular circumstances, how to automate and routinize their personal cybersecurity, how to recognize security breaches and act swiftly to seal them, and how to recover losses and restore functionality when attacks succeed. What You'll Learn How computer security works and what can it protect us from How a typical hacker attack works How to evaluate computer security threats to the individual user and corporate systems How to identify the critical vulnerabilities of a computer connected to the Internet How to manage your computer to reduce vulnerabilities to yourself and your employer How the adoption of newer forms of biometric authentication affects you Who This Book Is For The primary audience is proficient and technically knowledgeable computer users who are anxious about cybercrime and want to understand the technology behind both attack and defense but do not want to go so far as to become security experts. Some of this audience will be purely home users, but many will be executives, technical managers, developers, and members of IT departments who need to adopt personal practices for their own safety and the protection of corporate systems. Many will want to impart good cybersecurity practices to their colleagues. IT departments tasked with indoctrinating their users with good safety practices may use the book as training material.

Ajándékozza oda ezt a könyvet még ma
Nagyon egyszerű
1 Tegye a kosárba könyvet, és válassza ki a kiszállítás ajándékként opciót 2 Rögtön küldjük Önnek az utalványt 3 A könyv megérkezik a megajándékozott címére

Belépés

Bejelentkezés a saját fiókba. Még nincs Libristo fiókja? Hozza létre most!

 
kötelező
kötelező

Nincs fiókja? Szerezze meg a Libristo fiók kedvezményeit!

A Libristo fióknak köszönhetően mindent a felügyelete alatt tarthat.

Libristo fiók létrehozása