語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Firewalls don't stop dragons = a ste...
~
Parker, Carey.
FindBook
Google Book
Amazon
博客來
Firewalls don't stop dragons = a step-by-step guide to computer security and privacy for non-techies /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Firewalls don't stop dragons/ by Carey Parker.
其他題名:
a step-by-step guide to computer security and privacy for non-techies /
其他題名:
Firewalls do not stop dragons
作者:
Parker, Carey.
出版者:
Berkeley, CA :Apress : : 2023.,
面頁冊數:
xxxi, 589 p. :ill., digital ;24 cm.
內容註:
Chapter 1: Before We Begin -- Chapter 2: Cybersecurity 101 -- Chapter 3: First Things First -- Chapter 4: Passwords -- Chapter 5: Computer Security -- Chapter 6: Lan Sweet Lan -- Chapter 7: Practice Safe Surfing -- Chapter 8: Secure Communication -- Chapter 9: Online Accounts and Social Media -- Chapter 10: Parental Guidance -- Chapter 11: Don't Be a Smart Phone Dummy -- Chapter 12: Odds and Ends -- Chapter 13: Parting Thoughts -- Chapter 14: Glossary.
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-1-4842-9036-1
ISBN:
9781484290361
Firewalls don't stop dragons = a step-by-step guide to computer security and privacy for non-techies /
Parker, Carey.
Firewalls don't stop dragons
a step-by-step guide to computer security and privacy for non-techies /[electronic resource] :Firewalls do not stop dragonsby Carey Parker. - Fifth edition. - Berkeley, CA :Apress :2023. - xxxi, 589 p. :ill., digital ;24 cm.
Chapter 1: Before We Begin -- Chapter 2: Cybersecurity 101 -- Chapter 3: First Things First -- Chapter 4: Passwords -- Chapter 5: Computer Security -- Chapter 6: Lan Sweet Lan -- Chapter 7: Practice Safe Surfing -- Chapter 8: Secure Communication -- Chapter 9: Online Accounts and Social Media -- Chapter 10: Parental Guidance -- Chapter 11: Don't Be a Smart Phone Dummy -- Chapter 12: Odds and Ends -- Chapter 13: Parting Thoughts -- Chapter 14: Glossary.
Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers will find many useful tips here. This book contains everything you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Protecting your digital domain is much like defending a medieval castle. Wide moats, towering walls and trained guards provide defense in depth, safeguarding the people and property within against the most common threats. But attempting to dragon-proof your castle would be counterproductive and costly. The goal of this book is to keep your devices and data safe from the most likely and impactful hazards - not a targeted attack by the NSA. Like wearing seat belts and sunscreen in the real world, there are dozens of simple, effective precautions we need to take in the virtual world. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what you need to do, each chapter includes a detailed checklist of expert tips. But the book also explains why you need to do these things, using entertaining analogies and straightforward explanations. This revised and expanded fifth edition includes: Updated for Windows 11, macOS 13 (Ventura), iOS 16 and Android 13. Updated recommendations for most secure and private products. Over 200 tips with complete step-by-step instructions and screenshots. What You Will Learn Maximize your computer and smartphone security. Minimize your vulnerabilities and data footprint. Solve your password problems and use two-factor authentication. Browse the web safely and confidently with a secure, private browser. Shop and bank online with maximum security and peace of mind. Defend against identity theft, ransomware and online scams. Safeguard your children online, at home and in school. Block online tracking, data mining and malicious online ads. Send files and messages with end-to-end encryption. Secure your home network and keep your smart devices from spying on you. Create automated backups of all your devices. Learn how to deal with account hacks, data. breaches and viruses. Understand how computers, the internet, VPNs and encryption really work And much more!
ISBN: 9781484290361
Standard No.: 10.1007/978-1-4842-9036-1doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25 / P37 2023
Dewey Class. No.: 005.8
Firewalls don't stop dragons = a step-by-step guide to computer security and privacy for non-techies /
LDR
:03977nmm a2200373 a 4500
001
2316498
003
DE-He213
005
20230203032743.0
006
m d
007
cr nn 008maaau
008
230902s2023 cau s 0 eng d
020
$a
9781484290361
$q
(electronic bk.)
020
$a
9781484290354
$q
(paper)
024
7
$a
10.1007/978-1-4842-9036-1
$2
doi
035
$a
978-1-4842-9036-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
P37 2023
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
P238 2023
100
1
$a
Parker, Carey.
$3
3504535
245
1 0
$a
Firewalls don't stop dragons
$h
[electronic resource] :
$b
a step-by-step guide to computer security and privacy for non-techies /
$c
by Carey Parker.
246
3
$a
Firewalls do not stop dragons
250
$a
Fifth edition.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2023.
300
$a
xxxi, 589 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: Before We Begin -- Chapter 2: Cybersecurity 101 -- Chapter 3: First Things First -- Chapter 4: Passwords -- Chapter 5: Computer Security -- Chapter 6: Lan Sweet Lan -- Chapter 7: Practice Safe Surfing -- Chapter 8: Secure Communication -- Chapter 9: Online Accounts and Social Media -- Chapter 10: Parental Guidance -- Chapter 11: Don't Be a Smart Phone Dummy -- Chapter 12: Odds and Ends -- Chapter 13: Parting Thoughts -- Chapter 14: Glossary.
520
$a
Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers will find many useful tips here. This book contains everything you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Protecting your digital domain is much like defending a medieval castle. Wide moats, towering walls and trained guards provide defense in depth, safeguarding the people and property within against the most common threats. But attempting to dragon-proof your castle would be counterproductive and costly. The goal of this book is to keep your devices and data safe from the most likely and impactful hazards - not a targeted attack by the NSA. Like wearing seat belts and sunscreen in the real world, there are dozens of simple, effective precautions we need to take in the virtual world. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what you need to do, each chapter includes a detailed checklist of expert tips. But the book also explains why you need to do these things, using entertaining analogies and straightforward explanations. This revised and expanded fifth edition includes: Updated for Windows 11, macOS 13 (Ventura), iOS 16 and Android 13. Updated recommendations for most secure and private products. Over 200 tips with complete step-by-step instructions and screenshots. What You Will Learn Maximize your computer and smartphone security. Minimize your vulnerabilities and data footprint. Solve your password problems and use two-factor authentication. Browse the web safely and confidently with a secure, private browser. Shop and bank online with maximum security and peace of mind. Defend against identity theft, ransomware and online scams. Safeguard your children online, at home and in school. Block online tracking, data mining and malicious online ads. Send files and messages with end-to-end encryption. Secure your home network and keep your smart devices from spying on you. Create automated backups of all your devices. Learn how to deal with account hacks, data. breaches and viruses. Understand how computers, the internet, VPNs and encryption really work And much more!
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Privacy.
$3
528582
650
2 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Principles and Models of Security.
$3
3382356
650
2 4
$a
Computer Crime.
$3
3382518
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-9036-1
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9452748
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 P37 2023
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入