|
|
|
|
LEADER |
02682nmm a2200493 u 4500 |
001 |
EB001921166 |
003 |
EBX01000000000000001084068 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 9781484238523
|
020 |
|
|
|a 9781484238530
|
020 |
|
|
|a 1484238524
|
050 |
|
4 |
|a QA76.9.A25
|
100 |
1 |
|
|a Parker, Carey
|
245 |
0 |
0 |
|a Firewalls don't stop dragons
|b a step-by-step guide to computer security for non-techies
|c Carey Parker
|
246 |
3 |
1 |
|a Firewalls do not stop dragons
|
250 |
|
|
|a Third edition
|
260 |
|
|
|a New York
|b Apress
|c 2018
|
300 |
|
|
|a 1 online resource
|
505 |
0 |
|
|a Chapter 5: Computer Security -- Chapter 6: Lan Sweet Lan -- Chapter 7: Practice Safe Surfing -- Chapter 8: Secure Communication -- Chapter 9: Online Accounts and Social Media -- Chapter 10: Parental Guidance -- Chapter 11: Don't Be a Smart Phone Dummy -- Chapter 12: Odds and Ends -- Chapter 13: Parting Thoughts -- Glossary
|
505 |
0 |
|
|a Includes bibliographical references and index
|
505 |
0 |
|
|a Chapter 1: Before We Begin. "How Worried Should I Be?"; How to Use This Book; Not So Fast
|
505 |
0 |
|
|a Chapter 2: Cybersecurity 101. Here Be Dragons; Computer Lingo; Hardware and Software; Know Your Enemy; How the Internet Works; Tools of the Trade; Privacy and Tracking; Who Can You Trust?
|
505 |
0 |
|
|a Chapter 4: Passwords. How Did We Get Here?; Understanding Password Strength; Managing Your Passwords; Choosing a Master Password; Doing the Two-Step; Periodically Changing Passwords
|
505 |
0 |
|
|a Chapter 3: The Three Ups: Back Up, Clean Up, and Update. Backups; Spring Cleaning; Update Everything
|
653 |
|
|
|a Sécurité informatique
|
653 |
|
|
|a Computer security / http://id.loc.gov/authorities/subjects/sh90001862
|
653 |
|
|
|a Computer security / fast
|
653 |
|
|
|a Computer Security
|
653 |
|
|
|a COMPUTERS / Security / General / bisacsh
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
028 |
5 |
0 |
|a 10.1007/978-1-4842-3852-3
|
015 |
|
|
|a GBB912912
|
024 |
8 |
|
|a 10.1007/978-1-4842-3852-3
|
776 |
|
|
|z 9781484238530
|
776 |
|
|
|z 1484238524
|
776 |
|
|
|z 9781484238516
|
776 |
|
|
|z 1484238516
|
776 |
|
|
|z 9781484238523
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781484238523/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a Just how secure is your computer? Protecting your computer is like defending a medieval castle: moats and castle guards can be effective, but you'd bankrupt the kingdom trying to build something dragon-proof. Parker shows you dozens of no-brainer things we should all be doing to protect our computers and safeguard our data
|