|
|
|
|
LEADER |
03475nam a2200325Ia 4500 |
001 |
3819 |
003 |
FlBoTFG |
005 |
20121226160756.0 |
006 |
m|||||o||d|||||||| |
007 |
cr|||| |
008 |
121226s2013 flua sb 000 0 eng d |
020 |
# |
# |
|a 9781439856192 (e-book : PDF)
|
040 |
# |
# |
|a FlBoTFG
|c FlBoTFG
|
090 |
# |
# |
|a QA76.9.A25
|b J224 2013
|
092 |
# |
# |
|a 005.8
|b J177
|
100 |
1 |
# |
|a Jacobson, Douglas.
|
245 |
1 |
0 |
|a Computer security literacy
|b staying safe in a digital world /
|c Douglas Jacobson and Joseph Idziorek.
|h [electronic resource] :
|
260 |
# |
# |
|a Boca Raton :
|b CRC Press,
|c 2013.
|
300 |
# |
# |
|a xxiii, 344 p. :
|b col. ill.
|
500 |
# |
# |
|a "A Chapman & Hall book."
|
504 |
# |
# |
|a Includes bibliographical references.
|
505 |
0 |
# |
|a ch. 1. What is information security? -- ch. 2. Introduction to computers and the internet -- ch. 3. Passwords under attack -- ch. 4. Email security -- ch. 5. Malware : the dark side of software -- ch. 6. Malware : defense in depth -- ch. 7. Securely surfing the world wide web -- ch. 8. Online shopping -- ch. 9. Wireless internet security -- ch. 10. Socicial networking -- ch. 11. Social engineering : phishing for suckers -- ch. 12. Staying safe online : the human threat -- ch. 13. Case studies -- ch. 14. Moving forward with security and book summary.
|
520 |
# |
# |
|a "Preface Approach Traditional computer security books educate readers about a multitude of topics, ranging from secure programming practices, protocols, and algorithm designs to cryptography and ethics. These books typically focus on the implementation or theory of security controls and mechanisms at the application, operating system, network, and physical layers. Breaking this traditional model, "Computer Security Literacy: Staying Safe in a Digital World" instead seeks to educate the reader at the user layer and focuses on practical topics that one is likely to encounter on a regular basis. It has long been recognized that the user is in fact the weakest link in the security chain. So why not effect change by providing practical and relevant education for the normal user of information technology? As it turns out, we, the user, often have the greatest impact in the security of our computer and information as a result of the actions that we do or do not perform. This text provides practical security education to give the reader context to make sound security decisions. The outcomes of this book are as follows. The reader will be able to: - Define computer security terms and mechanisms - Describe fundamental security concepts - State computer security best practices - Describe the strengths, weaknesses, and limitations of security mechanisms and concepts - Give examples of common security threats, threat sources, and threat motivations - Explain their role in protecting their own computing environment and personal and confidential information - Discuss current event topics and read security articles in the popular press - Assess computing actions in the context of securit"--
|c Provided by publisher.
|
530 |
# |
# |
|a Also available in print edition.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
650 |
# |
0 |
|a Computer security.
|
655 |
# |
7 |
|a Electronic books.
|2 lcsh
|
700 |
1 |
# |
|a Idziorek, Joseph.
|
776 |
1 |
# |
|z 9781439856185 (pbk.)
|
856 |
4 |
0 |
|q application/PDF
|u https://ezaccess.library.uitm.edu.my/login?url=http://marc.crcnetbase.com/isbn/9781439856192
|z Distributed by publisher. Purchase or institutional license may be required for access.
|