Understanding Security Issues / / Scott Donaldson, Chris Williams, Stanley Siegel.
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercrim...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2018 English |
---|---|
VerfasserIn: | |
TeilnehmendeR: | |
Place / Publishing House: | Boston ;, Berlin : : De|G Press, , [2018] ©2019 |
Year of Publication: | 2018 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (208 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9781501506505 |
---|---|
ctrlnum |
(DE-B1597)479830 (OCoLC)1083582177 |
collection |
bib_alma |
record_format |
marc |
spelling |
Donaldson, Scott, author. Understanding Security Issues / Scott Donaldson, Chris Williams, Stanley Siegel. Boston ; Berlin : De|G Press, [2018] ©2019 1 online resource (208 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Frontmatter -- About DeG PRESS -- Acknowledgments -- About the Authors -- Contents -- Introduction -- Chapter 1. Security Mindset -- Chapter 2. Common Cybersecurity Attacks -- Chapter 3. Protecting Your Computer(s) -- Chapter 4. Protecting Your Passwords -- Chapter 5. Protecting Your Home Network -- Chapter 6. Smartphones and Tablets -- Chapter 7. Protecting Your Web Browsing -- Chapter 8. Protecting Your E-Mail and Phone Calls -- Chapter 9. Protecting Your Identity, Privacy, and Family Online -- Chapter 10. Protecting Yourself on Travel -- Chapter 11. When Things Go Wrong -- Chapter 12. Considering Cybersecurity at Work -- Chapter 13. Final Thoughts -- Appendix A. Common Online Scams -- Appendix B. The Worst Passwords Ever -- Appendix C. Online Security Resources -- Glossary -- Index With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides a solid understanding of the threats, and focuses on useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go. This book discusses security awareness issues and how you can take steps to reduce the risk of becoming a victim: The threats that face every individual and business, all the time. Specific indicators of threats so that you understand when you might be attacked and what to do if they occur. The security mindset and good security practices. Assets that need to be protected at work and at home. Protecting yourself and your business at work. Protecting yourself and your family at home. Protecting yourself and your assets on travel. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 23. Jan 2019) Security, Cybercrime, Cybersecurity, Phishing, Hacking, Cyber threat, Virus. Siegel, Stanley, author. Williams, Chris, author. Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2018 English 9783110604252 Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2018 9783110603255 ZDB-23-DGG Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2018 English 9783110604023 Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2018 9783110603118 ZDB-23-DEI EPUB 9781501506369 print 9781501515231 https://doi.org/10.1515/9781501506505 Cover https://www.degruyter.com/cover/covers/9781501506505.jpg |
language |
English |
format |
eBook |
author |
Donaldson, Scott, Siegel, Stanley, Williams, Chris, |
spellingShingle |
Donaldson, Scott, Siegel, Stanley, Williams, Chris, Understanding Security Issues / Frontmatter -- About DeG PRESS -- Acknowledgments -- About the Authors -- Contents -- Introduction -- Chapter 1. Security Mindset -- Chapter 2. Common Cybersecurity Attacks -- Chapter 3. Protecting Your Computer(s) -- Chapter 4. Protecting Your Passwords -- Chapter 5. Protecting Your Home Network -- Chapter 6. Smartphones and Tablets -- Chapter 7. Protecting Your Web Browsing -- Chapter 8. Protecting Your E-Mail and Phone Calls -- Chapter 9. Protecting Your Identity, Privacy, and Family Online -- Chapter 10. Protecting Yourself on Travel -- Chapter 11. When Things Go Wrong -- Chapter 12. Considering Cybersecurity at Work -- Chapter 13. Final Thoughts -- Appendix A. Common Online Scams -- Appendix B. The Worst Passwords Ever -- Appendix C. Online Security Resources -- Glossary -- Index |
author_facet |
Donaldson, Scott, Siegel, Stanley, Williams, Chris, Siegel, Stanley, Williams, Chris, |
author_variant |
s d sd s s ss c w cw |
author_role |
VerfasserIn VerfasserIn VerfasserIn |
author2 |
Siegel, Stanley, Williams, Chris, |
author2_role |
TeilnehmendeR TeilnehmendeR |
author_sort |
Donaldson, Scott, |
title |
Understanding Security Issues / |
title_full |
Understanding Security Issues / Scott Donaldson, Chris Williams, Stanley Siegel. |
title_fullStr |
Understanding Security Issues / Scott Donaldson, Chris Williams, Stanley Siegel. |
title_full_unstemmed |
Understanding Security Issues / Scott Donaldson, Chris Williams, Stanley Siegel. |
title_auth |
Understanding Security Issues / |
title_alt |
Frontmatter -- About DeG PRESS -- Acknowledgments -- About the Authors -- Contents -- Introduction -- Chapter 1. Security Mindset -- Chapter 2. Common Cybersecurity Attacks -- Chapter 3. Protecting Your Computer(s) -- Chapter 4. Protecting Your Passwords -- Chapter 5. Protecting Your Home Network -- Chapter 6. Smartphones and Tablets -- Chapter 7. Protecting Your Web Browsing -- Chapter 8. Protecting Your E-Mail and Phone Calls -- Chapter 9. Protecting Your Identity, Privacy, and Family Online -- Chapter 10. Protecting Yourself on Travel -- Chapter 11. When Things Go Wrong -- Chapter 12. Considering Cybersecurity at Work -- Chapter 13. Final Thoughts -- Appendix A. Common Online Scams -- Appendix B. The Worst Passwords Ever -- Appendix C. Online Security Resources -- Glossary -- Index |
title_new |
Understanding Security Issues / |
title_sort |
understanding security issues / |
publisher |
De|G Press, |
publishDate |
2018 |
physical |
1 online resource (208 p.) |
contents |
Frontmatter -- About DeG PRESS -- Acknowledgments -- About the Authors -- Contents -- Introduction -- Chapter 1. Security Mindset -- Chapter 2. Common Cybersecurity Attacks -- Chapter 3. Protecting Your Computer(s) -- Chapter 4. Protecting Your Passwords -- Chapter 5. Protecting Your Home Network -- Chapter 6. Smartphones and Tablets -- Chapter 7. Protecting Your Web Browsing -- Chapter 8. Protecting Your E-Mail and Phone Calls -- Chapter 9. Protecting Your Identity, Privacy, and Family Online -- Chapter 10. Protecting Yourself on Travel -- Chapter 11. When Things Go Wrong -- Chapter 12. Considering Cybersecurity at Work -- Chapter 13. Final Thoughts -- Appendix A. Common Online Scams -- Appendix B. The Worst Passwords Ever -- Appendix C. Online Security Resources -- Glossary -- Index |
isbn |
9781501506505 9783110604252 9783110603255 9783110604023 9783110603118 9781501506369 9781501515231 |
url |
https://doi.org/10.1515/9781501506505 https://www.degruyter.com/cover/covers/9781501506505.jpg |
illustrated |
Not Illustrated |
doi_str_mv |
10.1515/9781501506505 |
oclc_num |
1083582177 |
work_keys_str_mv |
AT donaldsonscott understandingsecurityissues AT siegelstanley understandingsecurityissues AT williamschris understandingsecurityissues |
status_str |
n |
ids_txt_mv |
(DE-B1597)479830 (OCoLC)1083582177 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2018 English Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2018 Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2018 English Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2018 |
is_hierarchy_title |
Understanding Security Issues / |
container_title |
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2018 English |
author2_original_writing_str_mv |
noLinkedField noLinkedField |
_version_ |
1770177060904370176 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04712nam a22007455i 4500</leader><controlfield tag="001">9781501506505</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20190123050854.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">190123s2018 mau fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781501506505</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781501506505</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)479830</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1083582177</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">mau</subfield><subfield code="c">US-MA</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM015000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM021030</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Donaldson, Scott, </subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Understanding Security Issues /</subfield><subfield code="c">Scott Donaldson, Chris Williams, Stanley Siegel.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston ;</subfield><subfield code="a">Berlin : </subfield><subfield code="b">De|G Press, </subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (208 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">About DeG PRESS -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">About the Authors -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Introduction -- </subfield><subfield code="t">Chapter 1. Security Mindset -- </subfield><subfield code="t">Chapter 2. Common Cybersecurity Attacks -- </subfield><subfield code="t">Chapter 3. Protecting Your Computer(s) -- </subfield><subfield code="t">Chapter 4. Protecting Your Passwords -- </subfield><subfield code="t">Chapter 5. Protecting Your Home Network -- </subfield><subfield code="t">Chapter 6. Smartphones and Tablets -- </subfield><subfield code="t">Chapter 7. Protecting Your Web Browsing -- </subfield><subfield code="t">Chapter 8. Protecting Your E-Mail and Phone Calls -- </subfield><subfield code="t">Chapter 9. Protecting Your Identity, Privacy, and Family Online -- </subfield><subfield code="t">Chapter 10. Protecting Yourself on Travel -- </subfield><subfield code="t">Chapter 11. When Things Go Wrong -- </subfield><subfield code="t">Chapter 12. Considering Cybersecurity at Work -- </subfield><subfield code="t">Chapter 13. Final Thoughts -- </subfield><subfield code="t">Appendix A. Common Online Scams -- </subfield><subfield code="t">Appendix B. The Worst Passwords Ever -- </subfield><subfield code="t">Appendix C. Online Security Resources -- </subfield><subfield code="t">Glossary -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides a solid understanding of the threats, and focuses on useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go. This book discusses security awareness issues and how you can take steps to reduce the risk of becoming a victim: The threats that face every individual and business, all the time. Specific indicators of threats so that you understand when you might be attacked and what to do if they occur. The security mindset and good security practices. Assets that need to be protected at work and at home. Protecting yourself and your business at work. Protecting yourself and your family at home. Protecting yourself and your assets on travel. </subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 23. Jan 2019)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security, Cybercrime, Cybersecurity, Phishing, Hacking, Cyber threat, Virus.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Siegel, Stanley, </subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Williams, Chris, </subfield><subfield code="e">author.</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2018 English</subfield><subfield code="z">9783110604252</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2018</subfield><subfield code="z">9783110603255</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2018 English</subfield><subfield code="z">9783110604023</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2018</subfield><subfield code="z">9783110603118</subfield><subfield code="o">ZDB-23-DEI</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9781501506369</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9781501515231</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781501506505</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9781501506505.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-060402-3 EBOOK PACKAGE Engineering, Computer Sciences 2018 English</subfield><subfield code="b">2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-060425-2 EBOOK PACKAGE COMPLETE 2018 English</subfield><subfield code="b">2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA7ENG</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DEI</subfield><subfield code="b">2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2017</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA14ALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA1ALL</subfield></datafield></record></collection> |