Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies /: a step-by-step guide to computer security for non-techies. (2018)
- Record Type:
- Book
- Title:
- Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies /: a step-by-step guide to computer security for non-techies. (2018)
- Main Title:
- Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies
- Other Titles:
- Firewalls do not stop dragons
- Further Information:
- Note: Carey Parker.
- Authors:
- Parker, Carey
- Contents:
- Intro; Table of Contents; About the Author; About the Technical Reviewer; Preface; Chapter 1: Before We Begin; "How Worried Should I Be?"; Threat Analysis; Indirect Threats; Privacy vs. Security; Summary; How to Use This Book; Reader Prerequisites; Operating Systems Covered; Navigating the Checklists; Tip 1-1. Simple Tip; Tip 1-2. Tip with Steps; Tip 1-3. Tip with Variations; Tip 1-3a. Microsoft Windows 7; Tip 1-3b. Microsoft Windows 8.1/10; Tip 1-3c. Mac OS; Web Addresses and Staying Up-to-Date; Always Go to the Source; Feedback Welcome; Spread the Word; Not So Fast. Chapter 2: Cybersecurity 101Here Be Dragons; I Dub Thee ... ; Prevention, Detection, and Recovery; Computer Lingo; Hardware and Software; File Manager; Bits and Bytes; Storage; Networks (Wired and Wireless); Bandwidth; Bluetooth; Clients and Servers; The Cloud; Net Neutrality; The Internet of Things; Know Your Enemy; Malware; Hardware Bugs; Exploit; How the Internet Works; Tools of the Trade; Encryption and Cryptanalysis; Modern Cryptography; Authentication and Message Integrity; Triple-A; Newer Isn't Always Better; Privacy and Tracking; Who Can You Trust?; Summary; Checklist. Tip 2-1. Know ThyselfTip 2-2. Know What They Know; Chapter 3: The Three Ups: Back Up, Clean Up, and Update; Backups; Spring Cleaning; Update Everything; Summary; Checklist; Operating System Configuration; Microsoft Windows 7; Microsoft Windows 8.1; Microsoft Windows 10; Mac OS; Tip 3-1. Back Up to an External Drive; Buy an External HardIntro; Table of Contents; About the Author; About the Technical Reviewer; Preface; Chapter 1: Before We Begin; "How Worried Should I Be?"; Threat Analysis; Indirect Threats; Privacy vs. Security; Summary; How to Use This Book; Reader Prerequisites; Operating Systems Covered; Navigating the Checklists; Tip 1-1. Simple Tip; Tip 1-2. Tip with Steps; Tip 1-3. Tip with Variations; Tip 1-3a. Microsoft Windows 7; Tip 1-3b. Microsoft Windows 8.1/10; Tip 1-3c. Mac OS; Web Addresses and Staying Up-to-Date; Always Go to the Source; Feedback Welcome; Spread the Word; Not So Fast. Chapter 2: Cybersecurity 101Here Be Dragons; I Dub Thee ... ; Prevention, Detection, and Recovery; Computer Lingo; Hardware and Software; File Manager; Bits and Bytes; Storage; Networks (Wired and Wireless); Bandwidth; Bluetooth; Clients and Servers; The Cloud; Net Neutrality; The Internet of Things; Know Your Enemy; Malware; Hardware Bugs; Exploit; How the Internet Works; Tools of the Trade; Encryption and Cryptanalysis; Modern Cryptography; Authentication and Message Integrity; Triple-A; Newer Isn't Always Better; Privacy and Tracking; Who Can You Trust?; Summary; Checklist. Tip 2-1. Know ThyselfTip 2-2. Know What They Know; Chapter 3: The Three Ups: Back Up, Clean Up, and Update; Backups; Spring Cleaning; Update Everything; Summary; Checklist; Operating System Configuration; Microsoft Windows 7; Microsoft Windows 8.1; Microsoft Windows 10; Mac OS; Tip 3-1. Back Up to an External Drive; Buy an External Hard Drive; Connect the Drive to Your Computer; Configure Your Backup; Tip 3-1a. Microsoft Windows 7; Tip 3-1b. Microsoft Windows 8.1; Tip 3-1c. Microsoft Windows 10; Tip 3-1d. Mac OS; Tip 3-2. Back Up to the Cloud; Tip 3-3. Buy a UPS; Tip 3-4. Clean Up Your Apps. Tip 3-4a. Microsoft Windows 7Tip 3-4b. Microsoft Windows 8.1; Tip 3-4c. Microsoft Windows 10; Tip 3-4d. Mac OS; Update Everything; Tip 3-5. Turn On Auto-Update for Your OS; Tip 3-5a. Microsoft Windows 7; Tip 3-5b. Microsoft Windows 8.1; Tip 3-5c. Microsoft Windows 10; Tip 3-5d. Mac OS; Tip 3-6. Update Adobe Flash (If You Really Need It); Tip 3-7. Update Java (If You Really Need It); Chapter 4: Passwords; How Did We Get Here?; Understanding Password Strength; Managing Your Passwords; Choosing a Master Password; Doing the Two-Step; Periodically Changing Passwords; Summary; Checklist. Tip 4-1. Choose a Strong Master PasswordTip 4-2. Install LastPass on Your Computer; Tip 4-3. Install the LastPass App on Your Smartphone; Tip 4-4. Enable Two-Factor Authentication; Tip 4-5. Disallow LastPass Login from Foreign Countries; Tip 4-6. Create Some One-Time Passwords; Tip 4-7. Disable Password Saving on Your Browser; Tip 4-8. Perform a Security Check in LastPass; Tip 4-9. Generate Strong Passwords for Key Accounts; Tip 4-10. Use LastPass to Store Secure Notes; Tip 4-11. Generate and Store Offline Passwords; Tip 4-12. Use Throwaway Accounts; Chapter 5: Computer Security. … (more)
- Edition:
- Third edition
- Publisher Details:
- New York : Apress
- Publication Date:
- 2018
- Extent:
- 1 online resource
- Subjects:
- 005.8
Computer security
COMPUTERS -- Security -- General
Computer security
Electronic books - Languages:
- English
- ISBNs:
- 9781484238523
1484238524
9781484238530
1484238532 - Related ISBNs:
- 9781484238516
1484238516 - Notes:
- Note: Includes bibliographical references and index.
Note: Online resource; title from PDF title page (EBSCO, viewed August 29, 2018). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.379018
- Ingest File:
- 02_361.xml