Personal cybersecurity how to avoid and recover from cybercrime
Through instructive examples and scenarios, the author shows you how to adapt and apply best practices to your own particular circumstances, how to automate and routinize your personal cybersecurity, how to recognize security breaches and act swiftly to seal them, and how to recover losses and resto...
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Bellingham, Washington
Apress
2017
|
Subjects: | |
Online Access: | |
Collection: | O'Reilly - Collection details see MPG.ReNa |
Table of Contents:
- 1. What's biting us?
- 2. Why is computer security so weak?
- 3. How does computer security work?
- 4. Your computer is a target
- 5. Misuse of computers
- 6. Cloud threats
- 7. Why doesn't somebody stop it?
- 8. What has the industry done?
- 9. Personal defense
- 10. Disaster recovery
- Includes bibliographical references and index