×
Uh-oh, it looks like your Internet Explorer is out of date.
For a better shopping experience, please upgrade now.

Computer Security Literacy: Staying Safe in a Digital World
368
by Douglas Jacobson, Joseph IdziorekDouglas Jacobson
NOOK Book(eBook)
Available on Compatible NOOK Devices and the free NOOK Apps.
WANT A NOOK?
Explore Now
50.49
In Stock
Overview
Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practica
Product Details
ISBN-13: | 9781000755626 |
---|---|
Publisher: | CRC Press |
Publication date: | 04/19/2016 |
Sold by: | Barnes & Noble |
Format: | NOOK Book |
Pages: | 368 |
File size: | 5 MB |
About the Author
Douglas Jacobson
Joseph Idziorek
Table of Contents
What Is Information Security? Introduction to Computers and the Internet. Passwords under Attack. Email Security. Malware: The Dark Side of Software. Malware: Defense in Depth. Securely Surfing the World Wide Web. Online Shopping. Wireless Internet Security. Social Networking. Social Engineering: Phishing for Suckers. Staying Safe Online: The Human Threat. Case Studies. Moving Forward with Security and Book Summary. Glossary. Appendices.Customer Reviews
Related Searches
Explore More Items
Meet some of the finest digital 2D and 3D artists working in the industry today, ...
Meet some of the finest digital 2D and 3D artists working in the industry today,
from Patrick Beaulieu, Philip Straub, Benita Winckler, Alessandro Baldasseroni to Khalid Al Muharraqi, Marcel Baumann and Marek Denko and see how they work. More than ...
Photogrammetry is the use of photography for surveying primarily and is used for the production ...
Photogrammetry is the use of photography for surveying primarily and is used for the production
of maps from aerial photographs. Along with remote sensing, it represents the primary means of generating data for Geographic Information Systems (GIS). As technology develops, ...
Facebook Inc has recentally launched a feature by using which,one can track any photograph posted ...
Facebook Inc has recentally launched a feature by using which,one can track any photograph posted
by his friend or any one not in his/her friend's list, but using Facebook.The feature is based on API and Computational Intelligence System.Similary 'Vahna' a ...
The hand is quicker than the eye. In many cases, so is digital video. Maintaining ...
The hand is quicker than the eye. In many cases, so is digital video. Maintaining
image quality in bandwidth- and memory-restricted environments is quickly becoming a reality as thriving research delves ever deeper into perceptual coding techniques, which discard superfluous ...
The healthcare industry is under privacy attack. The book discusses the issues from the healthcare ...
The healthcare industry is under privacy attack. The book discusses the issues from the healthcare
organization and individual perspectives. Someone hacking into a medical device and changing it is life-threatening. Personal information is available on the black market. And there ...
Shrinking pixel sizes along with improvements in image sensors, optics, and electronics have elevated DSCs ...
Shrinking pixel sizes along with improvements in image sensors, optics, and electronics have elevated DSCs
to levels of performance that match, and have the potential to surpass, that of silver-halide film cameras. Image Sensors and Signal Processing for Digital Still ...
Most of the devices in the Internet of Things will be battery powered sensor devices. ...
Most of the devices in the Internet of Things will be battery powered sensor devices.
All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve ...
Get up and running with collecting evidence using forensics best practices to present your findings ...
Get up and running with collecting evidence using forensics best practices to present your findings
in judicial or administrative proceedingsKey Features Learn the core techniques of computer forensics to acquire and secure digital evidence skillfully Conduct a digital forensic examination ...