Download Computer Security Literacy: Staying Safe in a Digital World by Douglas Jacobson, Joseph Idziorek PDF

By Douglas Jacobson, Joseph Idziorek

Machine clients have an important influence at the safety in their machine and private info as a result activities they practice (or don't perform). aiding the common consumer of pcs, or extra greatly info expertise, make sound safety judgements, computing device defense Literacy: Staying secure in a electronic global specializes in sensible safeguard issues that clients are inclined to stumble upon on a typical basis.

Written for nontechnical readers, the e-book offers context to regimen computing projects in order that readers greater comprehend the functionality and impression of safety in way of life. The authors provide useful machine safeguard wisdom on various themes, together with social engineering, electronic mail, and on-line purchasing, and current top practices concerning passwords, instant networks, and suspicious emails. in addition they clarify how protection mechanisms, corresponding to antivirus software program and firewalls, safeguard opposed to the threats of hackers and malware.

While info expertise has turn into interwoven into virtually each element of lifestyle, many computing device clients shouldn't have functional desktop safeguard wisdom. This hands-on, in-depth consultant is helping somebody drawn to details know-how to higher comprehend the sensible elements of laptop safety and effectively navigate the hazards of the electronic world.

Show description

Read or Download Computer Security Literacy: Staying Safe in a Digital World PDF

Best security books

CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide

Filenote: PDF retail from EBL. Publisher/EBL seem to have created it via taking their great epub and switched over to PDF instead of the common attractive PDF imprint. name is in OD so could be a nicer imprint.
------------------------

CISSP research consultant -  totally up-to-date for the 2015 CISSP physique of information

CISSP (ISC)2 qualified info structures safety specialist reputable examine advisor, seventh version has been thoroughly up-to-date for the newest 2015 CISSP physique of information. This bestselling Sybex research advisor covers a hundred% of all examination pursuits. You'll arrange for the examination smarter and swifter with Sybex due to professional content material, real-world examples, recommendation on passing every one portion of the examination, entry to the Sybex on-line interactive studying surroundings, and masses extra. strengthen what you've discovered with key subject examination necessities and bankruptcy evaluation questions.

Along with the publication, you furthermore mght get entry to Sybex's better on-line interactive studying surroundings that incorporates:
• 4 special 250 query perform checks that will help you determine the place you want to learn extra.
• Get greater than ninety percentage of the solutions right, and you're able to take the certification examination.
• greater than 1,000 digital Flashcards to augment your studying and provides you last-minute try out prep sooner than the examination
• A searchable thesaurus in PDF to provide you immediate entry to the main phrases you must comprehend for the examination

Coverage of all the examination subject matters within the booklet capability you'll be prepared for:
• safety and chance administration
• Asset safeguard
• defense Engineering
• conversation and community safety
• identification and entry administration
• protection review and trying out
• defense Operations
• Software Development safety

Hack proofing your Web applications: the only way to stop a hacker is to think like one

When you don’t hack your platforms, who will? one of many purposes I positioned this e-book venture jointly is that i think protection pros will be hackers. for this reason, by way of hackers, I suggest those who find themselves able to defeating safety features. This booklet purports to coach humans the way to be hackers. actually, most people who purchase this e-book will accomplish that simply because they need to guard their very own structures and people in their agency.

Extra info for Computer Security Literacy: Staying Safe in a Digital World

Example text

Malware also has other functions, including using the victim’s computer to mount attacks against other computers on the Internet. Chapter 5 discusses the many ways in which malware finds its way onto a computer. The second threat category is disclosure of private information. There are many ways, including through malware, that information can be improperly disclosed. The impact arising from the loss of confidentiality of information depends on the type of information disclosed. Some information may have a monetary value, while other information may be personal in nature.

This is why OS vendors are constantly providing software patches/updates (Chapter 6), typically by way of Internet downloads, to reduce or eliminate vulnerabilities and thus protect computers from hackers and malware. The OS can also protect your computer Introduction to Computers and the Internet ◾ 25 by running applications like antivirus software and firewalls (Chapter 6) and, against being generally accessed by other users, by requiring a username/password combination to log in to the computer.

Hence, the term cloud is used in the context of cloud computing: The cloud is a representation of a black box mentality when it comes to accessing, processing, and storing information. 8 provides a representation of the hierarchical structure of the Internet. The Internet consists of interconnected networks and networking devices managed by entities called Internet service providers (ISPs). These ISPs have an informal hierarchy, and at the highest level, national, international, and large regional ISPs are interconnected to create what is often referred to as the “backbone” of the Internet.

Download PDF sample

Rated 4.97 of 5 – based on 12 votes