Firewalls don't stop dragons a step-by-step guide to computer security for non-techies

Just how secure is your computer? Protecting your computer is like defending a medieval castle: moats and castle guards can be effective, but you'd bankrupt the kingdom trying to build something dragon-proof. Parker shows you dozens of no-brainer things we should all be doing to protect our com...

Full description

Bibliographic Details
Main Author: Parker, Carey
Format: eBook
Language:English
Published: New York Apress 2018
Edition:Third edition
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02682nmm a2200493 u 4500
001 EB001921166
003 EBX01000000000000001084068
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9781484238523 
020 |a 9781484238530 
020 |a 1484238524 
050 4 |a QA76.9.A25 
100 1 |a Parker, Carey 
245 0 0 |a Firewalls don't stop dragons  |b a step-by-step guide to computer security for non-techies  |c Carey Parker 
246 3 1 |a Firewalls do not stop dragons 
250 |a Third edition 
260 |a New York  |b Apress  |c 2018 
300 |a 1 online resource 
505 0 |a Chapter 5: Computer Security -- Chapter 6: Lan Sweet Lan -- Chapter 7: Practice Safe Surfing -- Chapter 8: Secure Communication -- Chapter 9: Online Accounts and Social Media -- Chapter 10: Parental Guidance -- Chapter 11: Don't Be a Smart Phone Dummy -- Chapter 12: Odds and Ends -- Chapter 13: Parting Thoughts -- Glossary 
505 0 |a Includes bibliographical references and index 
505 0 |a Chapter 1: Before We Begin. "How Worried Should I Be?"; How to Use This Book; Not So Fast 
505 0 |a Chapter 2: Cybersecurity 101. Here Be Dragons; Computer Lingo; Hardware and Software; Know Your Enemy; How the Internet Works; Tools of the Trade; Privacy and Tracking; Who Can You Trust? 
505 0 |a Chapter 4: Passwords. How Did We Get Here?; Understanding Password Strength; Managing Your Passwords; Choosing a Master Password; Doing the Two-Step; Periodically Changing Passwords 
505 0 |a Chapter 3: The Three Ups: Back Up, Clean Up, and Update. Backups; Spring Cleaning; Update Everything 
653 |a Sécurité informatique 
653 |a Computer security / http://id.loc.gov/authorities/subjects/sh90001862 
653 |a Computer security / fast 
653 |a Computer Security 
653 |a COMPUTERS / Security / General / bisacsh 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
028 5 0 |a 10.1007/978-1-4842-3852-3 
015 |a GBB912912 
024 8 |a 10.1007/978-1-4842-3852-3 
776 |z 9781484238530 
776 |z 1484238524 
776 |z 9781484238516 
776 |z 1484238516 
776 |z 9781484238523 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484238523/?ar  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a Just how secure is your computer? Protecting your computer is like defending a medieval castle: moats and castle guards can be effective, but you'd bankrupt the kingdom trying to build something dragon-proof. Parker shows you dozens of no-brainer things we should all be doing to protect our computers and safeguard our data