While information technology has become interwoven into almost every aspect of daily life, many computer users do not have practical computer security knowledge. This hands-on, in-depth guide helps anyone interested in information technology to better understand the practical aspects of computer security and successfully navigate the dangers of the digital world. Additional Product Features Dewey Edition.
What Is Information Security? How Do I Get Malware? What Does Malware Do? Now What? Smart Phones and Malware Hey! While the information is technical enough to provide value to information systems professionals, the organization around specific topics makes it accessible to non-technical users looking for information on specific issues. Technical information security professionals could also benefit from reading the book.
Neumann, Computing Reviews, March "User error was manifest last week when it was detailed that the New York Times was penetrated over the course of four months by Chinese hackers who infiltrated its network and obtained passwords for a significant amount of the Times reporters and employees.
Attempting to alleviate such user error issues, Computer Security Literacy: Staying Safe in a Digital World is a helpful security awareness book.
It provides the reader with an understanding and appreciation for the magnitude of computer security. Had the New York Times employees been aware of the risks and taken actions as written in Computer Security Literacy , odds are that the effects would have been much less, and they wouldn'e tm t have been a cover story in their own periodical. Had the New York Times employees been aware of the risks and taken actions as written in Computer Security Literacy , odds are that the effects would have been much less, and they wouldne tm t have been a cover story in their own periodical.
Had the New York Times employees been aware of the risks and taken actions as written in Computer Security Literacy , odds are that the effects would have been much less, and they wouldn't have been a cover story in their own periodical. The book provides information about essential security topics in an easy-to-read manner.
Show More Show Less. Add to Cart.
Pre-owned Pre-owned. No ratings or reviews yet. Be the first to write a review. Best Selling in Nonfiction See all.
Burn after Writing by Sharon Jones , Paperback 2. Save on Nonfiction Trending price is based on prices over last 90 days. Open Borders Inc.
You may also like. Douglas Adams Books.
Paperback Cookbook. As it turns out, we, the user, often have the greatest impact in the security of our computer and information as a result of the actions that we do or do not perform. This text provides practical security education to give the reader context to make sound security decisions. The outcomes of this book are as follows. The reader will be able to: - Define computer security terms and mechanisms - Describe fundamental security concepts - State computer security best practices - Describe the strengths, weaknesses, and limitations of security mechanisms and concepts - Give examples of common security threats, threat sources, and threat motivations - Explain their role in protecting their own computing environment and personal and confidential information - Discuss current event topics and read security articles in the popular press - Assess computing actions in the context of securit" Condition: -- HPB condition ratings.
HPB pick - Out of stock.