Personal cybersecurity how to avoid and recover from cybercrime

Through instructive examples and scenarios, the author shows you how to adapt and apply best practices to your own particular circumstances, how to automate and routinize your personal cybersecurity, how to recognize security breaches and act swiftly to seal them, and how to recover losses and resto...

Full description

Bibliographic Details
Main Author: Waschke, Marvin
Format: eBook
Language:English
Published: Bellingham, Washington Apress 2017
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Table of Contents:
  • 1. What's biting us?
  • 2. Why is computer security so weak?
  • 3. How does computer security work?
  • 4. Your computer is a target
  • 5. Misuse of computers
  • 6. Cloud threats
  • 7. Why doesn't somebody stop it?
  • 8. What has the industry done?
  • 9. Personal defense
  • 10. Disaster recovery
  • Includes bibliographical references and index