Cybersecurity For Dummies (eBook, PDF)
Alle Infos zum eBook verschenken
Cybersecurity For Dummies (eBook, PDF)
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Hier können Sie sich einloggen

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being "cyber-secure" means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked. If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the…mehr
- Geräte: PC
- mit Kopierschutz
- eBook Hilfe
- Größe: 12.01MB
- Joseph SteinbergCybersecurity For Dummies (eBook, PDF)21,99 €
- Joseph SteinbergCybersecurity For Dummies (eBook, ePUB)16,99 €
- Joseph SteinbergCybersecurity For Dummies (eBook, ePUB)21,99 €
- Roger A. GrimesRansomware Protection Playbook (eBook, PDF)18,99 €
- Kevin BeaverHacking For Dummies (eBook, PDF)20,99 €
- Ted CoombsCloud Security For Dummies (eBook, PDF)22,99 €
- Justin HutchensThe Language of Deception (eBook, PDF)22,99 €
-
-
-
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: Wiley
- Seitenzahl: 368
- Erscheinungstermin: 1. Oktober 2019
- Englisch
- ISBN-13: 9781119560357
- Artikelnr.: 58045341
- Verlag: Wiley
- Seitenzahl: 368
- Erscheinungstermin: 1. Oktober 2019
- Englisch
- ISBN-13: 9781119560357
- Artikelnr.: 58045341
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Se
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 27
Chapter 3: The Bad Guys You Must Defend Against and How They Plan to Attack
You 51
Part 2: Improving Your Own Personal Security 75
Chapter 4: Evaluating Your Current Cybersecurity Posture 77
Chapter 5: Enhancing Physical Security 101
Chapter 6: Cybersecurity Considerations When Working from Home 113
Part 3: Protecting Yourself from Yourself 123
Chapter 7: Securing Your Accounts 125
Chapter 8: Passwords 143
Chapter 9: Preventing Social Engineering Attacks 161
Part 4: Cybersecurity for Businesses, Organizations, and Government 181
Chapter 10: Securing Your Small Business 183
Chapter 11: Cybersecurity and Big Businesses 207
Part 5: Handling a Security Incident (This Is a When, Not an If) 221
Chapter 12: Identifying a Security Breach 223
Chapter 13: Recovering from a Security Breach 241
Part 6: Backing Up and Recovery 261
Chapter 14: Backing Up 263
Chapter 15: Resetting Your Device 293
Chapter 16: Restoring from Backups 305
Part 7: Looking Toward the Future 329
Chapter 17: Pursuing a Cybersecurity Career 331
Chapter 18: Meeting the Onrush of Artificial Intelligence 345
Chapter 19: Emerging Technologies Bring New Threats 355
Part 8: The Part of Tens 369
Chapter 20: Ten Ways to Improve Your Cybersecurity without Spending a
Fortune 371
Chapter 21: Ten (or So) Lessons from Major Cybersecurity Breaches 379
Chapter 22: Ten Ways to Safely Use Public Wi-Fi 387
Index 393
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Se
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 27
Chapter 3: The Bad Guys You Must Defend Against and How They Plan to Attack
You 51
Part 2: Improving Your Own Personal Security 75
Chapter 4: Evaluating Your Current Cybersecurity Posture 77
Chapter 5: Enhancing Physical Security 101
Chapter 6: Cybersecurity Considerations When Working from Home 113
Part 3: Protecting Yourself from Yourself 123
Chapter 7: Securing Your Accounts 125
Chapter 8: Passwords 143
Chapter 9: Preventing Social Engineering Attacks 161
Part 4: Cybersecurity for Businesses, Organizations, and Government 181
Chapter 10: Securing Your Small Business 183
Chapter 11: Cybersecurity and Big Businesses 207
Part 5: Handling a Security Incident (This Is a When, Not an If) 221
Chapter 12: Identifying a Security Breach 223
Chapter 13: Recovering from a Security Breach 241
Part 6: Backing Up and Recovery 261
Chapter 14: Backing Up 263
Chapter 15: Resetting Your Device 293
Chapter 16: Restoring from Backups 305
Part 7: Looking Toward the Future 329
Chapter 17: Pursuing a Cybersecurity Career 331
Chapter 18: Meeting the Onrush of Artificial Intelligence 345
Chapter 19: Emerging Technologies Bring New Threats 355
Part 8: The Part of Tens 369
Chapter 20: Ten Ways to Improve Your Cybersecurity without Spending a
Fortune 371
Chapter 21: Ten (or So) Lessons from Major Cybersecurity Breaches 379
Chapter 22: Ten Ways to Safely Use Public Wi-Fi 387
Index 393