Description |
1 online resource |
|
text file PDF rda |
Summary |
Just how secure is your computer? Protecting your computer is like defending a medieval castle: moats and castle guards can be effective, but you'd bankrupt the kingdom trying to build something dragon-proof. Parker shows you dozens of no-brainer things we should all be doing to protect our computers and safeguard our data. |
Contents |
Chapter 1: Before We Begin. "How Worried Should I Be?"; How to Use This Book; Not So Fast. |
|
Chapter 2: Cybersecurity 101. Here Be Dragons; Computer Lingo; Hardware and Software; Know Your Enemy; How the Internet Works; Tools of the Trade; Privacy and Tracking; Who Can You Trust? |
|
Chapter 3: The Three Ups: Back Up, Clean Up, and Update. Backups; Spring Cleaning; Update Everything. |
|
Chapter 4: Passwords. How Did We Get Here?; Understanding Password Strength; Managing Your Passwords; Choosing a Master Password; Doing the Two-Step; Periodically Changing Passwords. |
|
Chapter 5: Computer Security -- Chapter 6: Lan Sweet Lan -- Chapter 7: Practice Safe Surfing -- Chapter 8: Secure Communication -- Chapter 9: Online Accounts and Social Media -- Chapter 10: Parental Guidance -- Chapter 11: Don't Be a Smart Phone Dummy -- Chapter 12: Odds and Ends -- Chapter 13: Parting Thoughts -- Glossary. |
Bibliography |
Includes bibliographical references and index. |
Subject |
Computer security.
|
|
Computer Security |
|
Sécurité informatique. |
|
Computer security |
Added Title |
Firewalls do not stop dragons |
Other Form: |
Print version: Parker, Carey. Firewalls don't stop dragons. Third edition. New York : Apress, 2018 1484238516 9781484238516 (OCoLC)1042352752 |
ISBN |
9781484238523 (electronic bk.) |
|
1484238524 (electronic bk.) |
|
9781484238530 (print) |
|
1484238532 |
Standard No. |
10.1007/978-1-4842-3852-3 doi |
|
10.1007/978-1-4842-3 |
Report No. |
SPRINTER |
|