This book describes common threats to your cybersecurity and practical steps you can take to avoid them. Threats explained include weak or reused passwords, malware, viruses, social engineering, outdated software, ransomware, the internet of things (IoT) and risky Internet browsing. Tools and techniques to help enhance your security like multi-factor authentication (MFA), firewalls, backups, virtual private networks (VPN) are also explained.
*Discusses how weak passwords can lead to vulnerabilities and how to create strong ones that are easy to remember.
* Describes social engineering attacks, why you may be vulnerable to them and how to protect yourself.
*Explains how Multi-Factor Authentication (MFA) works and how to enable it.
*Presents how to protect your system against a Ransomware attack.
Auflage
Sprache
Verlagsort
Zielgruppe
Für Beruf und Forschung
US School Grade: College Graduate Student
Produkt-Hinweis
Illustrationen
100 s/w Abbildungen
100 Illustrations, black and white
Maße
Höhe: 229 mm
Breite: 178 mm
Dicke: 26 mm
Gewicht
ISBN-13
978-1-5015-2313-7 (9781501523137)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Kelly C. Bourne is a seasoned programmer with over 45 years of experience across a variety of languages and platforms. He has recently served as an application administrator at The Interpublic Group of Companies, specializing in supporting critical applications such as SAP Concur Expense, Kalix/Longview for financial analytics, FSI Track for unclaimed property management, and Nextance Contract Management System. Prior to this role, Kelly honed his skills in developing client/server applications using Visual Studio .NET, Visual Basic, Oracle, and Microsoft SQL Server.. Over the past decade, Kelly has extensively worked with relational databases and client/server systems, including Oracle, Microsoft SQL Server, and Access, showcasing expertise in database design, SQL writing, stored procedures, and query optimization. He has authored three books, Application Administrators Handbook, Morgan Kaufmann, Elsevier, 2013, Year 2000 Solutions for Dummies, IDG Books Worldwide, 1997, Testing Client/Server Systems, McGraw-Hill, 1997 and the upcoming Ransomware, Viruses, Social Engineering and Other Threats, 2025.