Understanding Security Issues / / Scott Donaldson, Chris Williams, Stanley Siegel.

With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercrim...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2018 English
VerfasserIn:
TeilnehmendeR:
Place / Publishing House:Boston ;, Berlin : : De|G Press, , [2018]
©2019
Year of Publication:2018
Language:English
Online Access:
Physical Description:1 online resource (208 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9781501506505
ctrlnum (DE-B1597)479830
(OCoLC)1083582177
collection bib_alma
record_format marc
spelling Donaldson, Scott, author.
Understanding Security Issues / Scott Donaldson, Chris Williams, Stanley Siegel.
Boston ; Berlin : De|G Press, [2018]
©2019
1 online resource (208 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Frontmatter -- About DeG PRESS -- Acknowledgments -- About the Authors -- Contents -- Introduction -- Chapter 1. Security Mindset -- Chapter 2. Common Cybersecurity Attacks -- Chapter 3. Protecting Your Computer(s) -- Chapter 4. Protecting Your Passwords -- Chapter 5. Protecting Your Home Network -- Chapter 6. Smartphones and Tablets -- Chapter 7. Protecting Your Web Browsing -- Chapter 8. Protecting Your E-Mail and Phone Calls -- Chapter 9. Protecting Your Identity, Privacy, and Family Online -- Chapter 10. Protecting Yourself on Travel -- Chapter 11. When Things Go Wrong -- Chapter 12. Considering Cybersecurity at Work -- Chapter 13. Final Thoughts -- Appendix A. Common Online Scams -- Appendix B. The Worst Passwords Ever -- Appendix C. Online Security Resources -- Glossary -- Index
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides a solid understanding of the threats, and focuses on useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go.  This book discusses security awareness issues and how you can take steps to reduce the risk of becoming a victim: The threats that face every individual and business, all the time. Specific indicators of threats so that you understand when you might be attacked and what to do if they occur. The security mindset and good security practices. Assets that need to be protected at work and at home. Protecting yourself and your business at work. Protecting yourself and your family at home. Protecting yourself and your assets on travel.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 23. Jan 2019)
Security, Cybercrime, Cybersecurity, Phishing, Hacking, Cyber threat, Virus.
Siegel, Stanley, author.
Williams, Chris, author.
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2018 English 9783110604252
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2018 9783110603255 ZDB-23-DGG
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2018 English 9783110604023
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2018 9783110603118 ZDB-23-DEI
EPUB 9781501506369
print 9781501515231
https://doi.org/10.1515/9781501506505
Cover https://www.degruyter.com/cover/covers/9781501506505.jpg
language English
format eBook
author Donaldson, Scott,
Siegel, Stanley,
Williams, Chris,
spellingShingle Donaldson, Scott,
Siegel, Stanley,
Williams, Chris,
Understanding Security Issues /
Frontmatter --
About DeG PRESS --
Acknowledgments --
About the Authors --
Contents --
Introduction --
Chapter 1. Security Mindset --
Chapter 2. Common Cybersecurity Attacks --
Chapter 3. Protecting Your Computer(s) --
Chapter 4. Protecting Your Passwords --
Chapter 5. Protecting Your Home Network --
Chapter 6. Smartphones and Tablets --
Chapter 7. Protecting Your Web Browsing --
Chapter 8. Protecting Your E-Mail and Phone Calls --
Chapter 9. Protecting Your Identity, Privacy, and Family Online --
Chapter 10. Protecting Yourself on Travel --
Chapter 11. When Things Go Wrong --
Chapter 12. Considering Cybersecurity at Work --
Chapter 13. Final Thoughts --
Appendix A. Common Online Scams --
Appendix B. The Worst Passwords Ever --
Appendix C. Online Security Resources --
Glossary --
Index
author_facet Donaldson, Scott,
Siegel, Stanley,
Williams, Chris,
Siegel, Stanley,
Williams, Chris,
author_variant s d sd
s s ss
c w cw
author_role VerfasserIn
VerfasserIn
VerfasserIn
author2 Siegel, Stanley,
Williams, Chris,
author2_role TeilnehmendeR
TeilnehmendeR
author_sort Donaldson, Scott,
title Understanding Security Issues /
title_full Understanding Security Issues / Scott Donaldson, Chris Williams, Stanley Siegel.
title_fullStr Understanding Security Issues / Scott Donaldson, Chris Williams, Stanley Siegel.
title_full_unstemmed Understanding Security Issues / Scott Donaldson, Chris Williams, Stanley Siegel.
title_auth Understanding Security Issues /
title_alt Frontmatter --
About DeG PRESS --
Acknowledgments --
About the Authors --
Contents --
Introduction --
Chapter 1. Security Mindset --
Chapter 2. Common Cybersecurity Attacks --
Chapter 3. Protecting Your Computer(s) --
Chapter 4. Protecting Your Passwords --
Chapter 5. Protecting Your Home Network --
Chapter 6. Smartphones and Tablets --
Chapter 7. Protecting Your Web Browsing --
Chapter 8. Protecting Your E-Mail and Phone Calls --
Chapter 9. Protecting Your Identity, Privacy, and Family Online --
Chapter 10. Protecting Yourself on Travel --
Chapter 11. When Things Go Wrong --
Chapter 12. Considering Cybersecurity at Work --
Chapter 13. Final Thoughts --
Appendix A. Common Online Scams --
Appendix B. The Worst Passwords Ever --
Appendix C. Online Security Resources --
Glossary --
Index
title_new Understanding Security Issues /
title_sort understanding security issues /
publisher De|G Press,
publishDate 2018
physical 1 online resource (208 p.)
contents Frontmatter --
About DeG PRESS --
Acknowledgments --
About the Authors --
Contents --
Introduction --
Chapter 1. Security Mindset --
Chapter 2. Common Cybersecurity Attacks --
Chapter 3. Protecting Your Computer(s) --
Chapter 4. Protecting Your Passwords --
Chapter 5. Protecting Your Home Network --
Chapter 6. Smartphones and Tablets --
Chapter 7. Protecting Your Web Browsing --
Chapter 8. Protecting Your E-Mail and Phone Calls --
Chapter 9. Protecting Your Identity, Privacy, and Family Online --
Chapter 10. Protecting Yourself on Travel --
Chapter 11. When Things Go Wrong --
Chapter 12. Considering Cybersecurity at Work --
Chapter 13. Final Thoughts --
Appendix A. Common Online Scams --
Appendix B. The Worst Passwords Ever --
Appendix C. Online Security Resources --
Glossary --
Index
isbn 9781501506505
9783110604252
9783110603255
9783110604023
9783110603118
9781501506369
9781501515231
url https://doi.org/10.1515/9781501506505
https://www.degruyter.com/cover/covers/9781501506505.jpg
illustrated Not Illustrated
doi_str_mv 10.1515/9781501506505
oclc_num 1083582177
work_keys_str_mv AT donaldsonscott understandingsecurityissues
AT siegelstanley understandingsecurityissues
AT williamschris understandingsecurityissues
status_str n
ids_txt_mv (DE-B1597)479830
(OCoLC)1083582177
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2018 English
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2018
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2018 English
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2018
is_hierarchy_title Understanding Security Issues /
container_title Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2018 English
author2_original_writing_str_mv noLinkedField
noLinkedField
_version_ 1770177060904370176
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04712nam a22007455i 4500</leader><controlfield tag="001">9781501506505</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20190123050854.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">190123s2018 mau fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781501506505</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781501506505</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)479830</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1083582177</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">mau</subfield><subfield code="c">US-MA</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM015000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM021030</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Donaldson, Scott, </subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Understanding Security Issues /</subfield><subfield code="c">Scott Donaldson, Chris Williams, Stanley Siegel.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston ;</subfield><subfield code="a">Berlin : </subfield><subfield code="b">De|G Press, </subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (208 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">About DeG PRESS -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">About the Authors -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Introduction -- </subfield><subfield code="t">Chapter 1. Security Mindset -- </subfield><subfield code="t">Chapter 2. Common Cybersecurity Attacks -- </subfield><subfield code="t">Chapter 3. Protecting Your Computer(s) -- </subfield><subfield code="t">Chapter 4. Protecting Your Passwords -- </subfield><subfield code="t">Chapter 5. Protecting Your Home Network -- </subfield><subfield code="t">Chapter 6. Smartphones and Tablets -- </subfield><subfield code="t">Chapter 7. Protecting Your Web Browsing -- </subfield><subfield code="t">Chapter 8. Protecting Your E-Mail and Phone Calls -- </subfield><subfield code="t">Chapter 9. Protecting Your Identity, Privacy, and Family Online -- </subfield><subfield code="t">Chapter 10. Protecting Yourself on Travel -- </subfield><subfield code="t">Chapter 11. When Things Go Wrong -- </subfield><subfield code="t">Chapter 12. Considering Cybersecurity at Work -- </subfield><subfield code="t">Chapter 13. Final Thoughts -- </subfield><subfield code="t">Appendix A. Common Online Scams -- </subfield><subfield code="t">Appendix B. The Worst Passwords Ever -- </subfield><subfield code="t">Appendix C. Online Security Resources -- </subfield><subfield code="t">Glossary -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides a solid understanding of the threats, and focuses on useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go.  This book discusses security awareness issues and how you can take steps to reduce the risk of becoming a victim: The threats that face every individual and business, all the time. Specific indicators of threats so that you understand when you might be attacked and what to do if they occur. The security mindset and good security practices. Assets that need to be protected at work and at home. Protecting yourself and your business at work. Protecting yourself and your family at home. Protecting yourself and your assets on travel. </subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 23. Jan 2019)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security, Cybercrime, Cybersecurity, Phishing, Hacking, Cyber threat, Virus.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Siegel, Stanley, </subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Williams, Chris, </subfield><subfield code="e">author.</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2018 English</subfield><subfield code="z">9783110604252</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2018</subfield><subfield code="z">9783110603255</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2018 English</subfield><subfield code="z">9783110604023</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2018</subfield><subfield code="z">9783110603118</subfield><subfield code="o">ZDB-23-DEI</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9781501506369</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9781501515231</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781501506505</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9781501506505.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-060402-3 EBOOK PACKAGE Engineering, Computer Sciences 2018 English</subfield><subfield code="b">2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-060425-2 EBOOK PACKAGE COMPLETE 2018 English</subfield><subfield code="b">2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA7ENG</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DEI</subfield><subfield code="b">2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2017</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA14ALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA1ALL</subfield></datafield></record></collection>