Login
0
Home
Catalog
Publishers
0
Home
Catalog
Publishers
Login
Home
/
Catalog
/
Security in the Digital World
Security in the Digital World
Author(s):
Graham Day
Published by
IT Governance Publishing
Publication Date:
Tue Nov 28 00:00:00 UTC 2017
Available in all formats
ISBN:
9781849289610
Pages:
226
https://doi.org/9781849289610
Facebook
Twitter
Linkedin
Whatsapp
Copy URL
PAPERBACK
EBOOK (EPUB)
EBOOK (PDF)
ISBN:
9781849289610
Price:
INR 1424.00
Add to cart
Buy Now
ISBN:
9781849289634
Price:
INR 1359.75
Add to cart
Buy Now
ISBN:
9781849289627
Price:
INR 1359.75
Add to cart
Buy Now
Table of contents
User Reviews
Cover
Title
Copyright
Dedication
Preface
Acknowledgements
About the Author
Contents
Introduction
Personal digital security top ten
Chapter 1: The Internet
1.1 Connecting
1.2 Browsers
1.3 Browser history
1.4 Tabs
1.5 Search engine
1.6 McAfee WebAdvisor
1.7 Spam filter
1.8 Ad blocker
1.9 Cookies
1.10 Email
1.11 iCloud
Chapter 2: The threats
2.1 Cyber crime
2.2 The who?
2.3 The why
2.4 The where
Chapter 3: The how
3.1 Social engineering
3.2 Malware
3.3 Ransomware
3.4 Trends
3.5 Summary
Chapter 4: Operating system – computers and laptops
4.1 MacOS
4.2 Windows
Chapter 5: Home office
5.1 Home office and home networks
5.2 Computer disposal
Chapter 6: Mobile security
6.1 Laptop
6.2 Public Wi-Fi
6.3 VPN
6.4 Public computers
6.5 USB devices
6.6 International travel
6.7 Summary
Chapter 7: Smartphones and tablets
7.1 Apple
7.2 Android
7.3 Antivirus
7.4 VPN
7.5 USB charging points
7.6 Bluetooth
7.7 Mobile device disposal
Chapter 8: Consumers
8.1 Certifications
8.2 Online purchasing
8.3 Chip and PIN cards
8.4 Contactless cards
8.5 Motioncard
8.6 Apple Pay and Internet of Things (IoT) payments
8.7 ATMs/Cashpoints
Chapter 9: Personal and consumer rights
9.1 Personal information and your rights
9.2 Reviewing a company
9.3 Medical information and institutions
9.4 Plans and activities
9.5 Big data
Chapter 10: Internet of Things (IoT)
10.1 Default password
10.2 Firewall
10.3 Network vulnerability management
10.4 Disposal of IoT devices
10.5 Cyber physical security
Chapter 11: Social networking security
11.1 Facebook
11.2 LinkedIn
11.3 Plenty of Fish
11.4 Tinder
11.5 WhatsApp
11.6 Snapchat
11.7 Twitter
Chapter 12: Parental security
12.1 Managing online security for children
12.2 Threats to children
12.3 Inappropriate content
12.4 Protect and manage
Chapter 13: Resilience
Chapter 14: Personal cyber security risk assessment
ITG Resources
Comments should not be blank
Rating
Sign In
Table of contents
Cover
Title
Copyright
Dedication
Preface
Acknowledgements
About the Author
Contents
Introduction
Personal digital security top ten
Chapter 1: The Internet
1.1 Connecting
1.2 Browsers
1.3 Browser history
1.4 Tabs
1.5 Search engine
1.6 McAfee WebAdvisor
1.7 Spam filter
1.8 Ad blocker
1.9 Cookies
1.10 Email
1.11 iCloud
Chapter 2: The threats
2.1 Cyber crime
2.2 The who?
2.3 The why
2.4 The where
Chapter 3: The how
3.1 Social engineering
3.2 Malware
3.3 Ransomware
3.4 Trends
3.5 Summary
Chapter 4: Operating system – computers and laptops
4.1 MacOS
4.2 Windows
Chapter 5: Home office
5.1 Home office and home networks
5.2 Computer disposal
Chapter 6: Mobile security
6.1 Laptop
6.2 Public Wi-Fi
6.3 VPN
6.4 Public computers
6.5 USB devices
6.6 International travel
6.7 Summary
Chapter 7: Smartphones and tablets
7.1 Apple
7.2 Android
7.3 Antivirus
7.4 VPN
7.5 USB charging points
7.6 Bluetooth
7.7 Mobile device disposal
Chapter 8: Consumers
8.1 Certifications
8.2 Online purchasing
8.3 Chip and PIN cards
8.4 Contactless cards
8.5 Motioncard
8.6 Apple Pay and Internet of Things (IoT) payments
8.7 ATMs/Cashpoints
Chapter 9: Personal and consumer rights
9.1 Personal information and your rights
9.2 Reviewing a company
9.3 Medical information and institutions
9.4 Plans and activities
9.5 Big data
Chapter 10: Internet of Things (IoT)
10.1 Default password
10.2 Firewall
10.3 Network vulnerability management
10.4 Disposal of IoT devices
10.5 Cyber physical security
Chapter 11: Social networking security
11.1 Facebook
11.2 LinkedIn
11.3 Plenty of Fish
11.4 Tinder
11.5 WhatsApp
11.6 Snapchat
11.7 Twitter
Chapter 12: Parental security
12.1 Managing online security for children
12.2 Threats to children
12.3 Inappropriate content
12.4 Protect and manage
Chapter 13: Resilience
Chapter 14: Personal cyber security risk assessment
ITG Resources
User Reviews
Comments should not be blank
Rating
Sign In
Citation
Citation Format
Chicago
APA
MLA
Chicago
Harvard
Mendeley
RIS
BibTex
Vancouver
EndNote
Copy to clipboard
Export