Description |
xiv, 240 pages : illustrations ; 23 cm |
Bibliography |
Includes bibliographical references and index. |
Contents |
What's biting us -- Why is computer securoty so weak? -- How does computer security work? -- Your computer is a target -- Misuse of computers -- Cloud threats -- Why doesn't somebody stop it? -- What has the industry done? -- Personal defense -- Disaster recovery. |
Summary |
Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual users at risk are increasing in step with accelerating mutation rates of malware and cybercriminal delivery systems. |
Subject |
Computer security.
|
|
Internet -- Security measures.
|
|
Computer security. (OCoLC)fst00872484
|
|
Internet -- Security measures.
(OCoLC)fst01751426
|
ISBN |
9781484224298 (paperback) : $34.99 |
|
1484224299 (paperback) |
|