Cybersecurity For Dummies

Sofort lieferbar | Lieferzeit: Sofort lieferbar I

35,48 €*

Alle Preise inkl. MwSt.|Versandkostenfrei
ISBN-13:
9781119867180
Veröffentl:
2022
Erscheinungsdatum:
10.06.2022
Seiten:
386
Autor:
Joseph Steinberg
Gewicht:
761 g
Format:
227x190x25 mm
Serie:
For Dummies
Sprache:
Englisch
Beschreibung:

Explore the latest developments in cybersecurity with this essential guideEvery day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is that we can all be cybersecure--and it doesn't take a degree in computer science to make it happen!Cybersecurity For Dummies is the down-to-earth guide you need to secure your own data (and your company's, too). You'll get step-by-step guidance on how to implement reasonable security measures, prevent cyber attacks, deal securely with remote work, and what to do in the event that your information is compromised.The book also offers:* Updated directions on how to prevent ransomware attacks and how to handle the situation if you become a target* Step-by-step instructions on how to create data backups and implement strong encryption* Basic info that every aspiring cybersecurity professional needs to knowCybersecurity For Dummies is the ideal handbook for anyone considering a career transition into cybersecurity, as well as anyone seeking to secure sensitive information.
Introduction 1Part 1: Getting Started with Cybersecurity 5Chapter 1: What Exactly Is Cybersecurity? 7Chapter 2: Getting to Know Common Cyberattacks 23Chapter 3: The Bad Guys You Must Defend Against 49Part 2: Improving Your Own Personal Security 69Chapter 4: Evaluating Your Current Cybersecurity Posture 71Chapter 5: Enhancing Physical Security 93Chapter 6: Cybersecurity Considerations When Working from Home 105Part 3: Protecting Yourself from Yourself 115Chapter 7: Securing Your Accounts 117Chapter 8: Passwords 135Chapter 9: Preventing Social Engineering Attacks 151Part 4: Cybersecurity for Businesses, Organizations, and Government 173Chapter 10: Securing Your Small Business 175Chapter 11: Cybersecurity and Big Businesses 201Part 5: Handling a Security Incident (This Is a When, Not an If) 217Chapter 12: Identifying a Security Breach 219Chapter 13: Recovering from a Security Breach 239Part 6: Backing Up and Recovery 259Chapter 14: Backing Up 261Chapter 15: Resetting Your Device 289Chapter 16: Restoring from Backups 299Part 7: Looking toward the Future 321Chapter 17: Pursuing a Cybersecurity Career 323Chapter 18: Emerging Technologies Bring New Threats 337Part 8: The Part of Tens 351Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367Index 371ntroduction 1Part 1: Getting Started with Cybersecurity 5Chapter 1: What Exactly Is Cybersecurity? 7Chapter 2: Getting to Know Common Cyberattacks 23Chapter 3: The Bad Guys You Must Defend Against 49Part 2: Improving Your Own Personal Security 69Chapter 4: Evaluating Your Current Cybersecurity Posture 71Chapter 5: Enhancing Physical Security 93Chapter 6: Cybersecurity Considerations When Working from Home 105Part 3: Protecting Yourself from Yourself 115Chapter 7: Securing Your Accounts 117Chapter 8: Passwords 135Chapter 9: Preventing Social Engineering Attacks 151Part 4: Cybersecurity for Businesses, Organizations, and Government 173Chapter 10: Securing Your Small Business 175Chapter 11: Cybersecurity and Big Businesses 201Part 5: Handling a Security Incident (This Is a When, Not an If) 217Chapter 12: Identifying a Security Breach 219Chapter 13: Recovering from a Security Breach 239Part 6: Backing Up and Recovery 259Chapter 14: Backing Up 261Chapter 15: Resetting Your Device 289Chapter 16: Restoring from Backups 299Part 7: Looking toward the Future 321Chapter 17: Pursuing a Cybersecurity Career 323Chapter 18: Emerging Technologies Bring New Threats 337Part 8: The Part of Tens 351Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367Index 371ntroduction 1Part 1: Getting Started with Cybersecurity 5Chapter 1: What Exactly Is Cybersecurity? 7Chapter 2: Getting to Know Common Cyberattacks 23Chapter 3: The Bad Guys You Must Defend Against 49Part 2: Improving Your Own Personal Security 69Chapter 4: Evaluating Your Current Cybersecurity Posture 71Chapter 5: Enhancing Physical Security 93Chapter 6: Cybersecurity Considerations When Working from Home 105Part 3: Protecting Yourself from Yourself 115Chapter 7: Securing Your Accounts 117Chapter 8: Passwords 135Chapter 9: Preventing Social Engineering Attacks 151Part 4: Cybersecurity for Businesses, Organizations, and Government 173Chapter 10: Securing Your Small Business 175Chapter 11: Cybersecurity and Big Businesses 201Part 5: Handling a Security Incident (This Is a When, Not an If) 217Chapter 12: Identifying a Security Breach 219Chapter 13: Recovering from a Security Breach 239Part 6: Backing Up and Recovery 259Chapter 14: Backing Up 261Chapter 15: Resetting Your Device 289Chapter 16: Restoring from Backups 299Part 7: Looking toward the Future 321Chapter 17: Pursuing a Cybersecurity Career 323Chapter 18: Emerging Technologies Bring New Threats 337Part 8: The Part of Tens 351Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367Index 371

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.

Google Plus
Powered by Inooga