|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Joseph SteinbergPublisher: John Wiley & Sons Inc Imprint: For Dummies Edition: 2nd edition Dimensions: Width: 18.50cm , Height: 2.80cm , Length: 23.40cm Weight: 0.544kg ISBN: 9781119867180ISBN 10: 1119867185 Pages: 416 Publication Date: 10 June 2022 Audience: Professional and scholarly , Professional & Vocational Replaced By: 9781394318728 Format: Paperback Publisher's Status: Active Availability: In stock We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsIntroduction 1 Part 1: Getting Started with Cybersecurity 5 Chapter 1: What Exactly Is Cybersecurity? 7 Chapter 2: Getting to Know Common Cyberattacks 23 Chapter 3: The Bad Guys You Must Defend Against 49 Part 2: Improving Your Own Personal Security 69 Chapter 4: Evaluating Your Current Cybersecurity Posture 71 Chapter 5: Enhancing Physical Security 93 Chapter 6: Cybersecurity Considerations When Working from Home 105 Part 3: Protecting Yourself from Yourself 115 Chapter 7: Securing Your Accounts 117 Chapter 8: Passwords 135 Chapter 9: Preventing Social Engineering Attacks 151 Part 4: Cybersecurity for Businesses, Organizations, and Government 173 Chapter 10: Securing Your Small Business 175 Chapter 11: Cybersecurity and Big Businesses 201 Part 5: Handling a Security Incident (This Is a When, Not an If) 217 Chapter 12: Identifying a Security Breach 219 Chapter 13: Recovering from a Security Breach 239 Part 6: Backing Up and Recovery 259 Chapter 14: Backing Up 261 Chapter 15: Resetting Your Device 289 Chapter 16: Restoring from Backups 299 Part 7: Looking toward the Future 321 Chapter 17: Pursuing a Cybersecurity Career 323 Chapter 18: Emerging Technologies Bring New Threats 337 Part 8: The Part of Tens 351 Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353 Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359 Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367 Index 371 ntroduction 1 Part 1: Getting Started with Cybersecurity 5 Chapter 1: What Exactly Is Cybersecurity? 7 Chapter 2: Getting to Know Common Cyberattacks 23 Chapter 3: The Bad Guys You Must Defend Against 49 Part 2: Improving Your Own Personal Security 69 Chapter 4: Evaluating Your Current Cybersecurity Posture 71 Chapter 5: Enhancing Physical Security 93 Chapter 6: Cybersecurity Considerations When Working from Home 105 Part 3: Protecting Yourself from Yourself 115 Chapter 7: Securing Your Accounts 117 Chapter 8: Passwords 135 Chapter 9: Preventing Social Engineering Attacks 151 Part 4: Cybersecurity for Businesses, Organizations, and Government 173 Chapter 10: Securing Your Small Business 175 Chapter 11: Cybersecurity and Big Businesses 201 Part 5: Handling a Security Incident (This Is a When, Not an If) 217 Chapter 12: Identifying a Security Breach 219 Chapter 13: Recovering from a Security Breach 239 Part 6: Backing Up and Recovery 259 Chapter 14: Backing Up 261 Chapter 15: Resetting Your Device 289 Chapter 16: Restoring from Backups 299 Part 7: Looking toward the Future 321 Chapter 17: Pursuing a Cybersecurity Career 323 Chapter 18: Emerging Technologies Bring New Threats 337 Part 8: The Part of Tens 351 Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353 Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359 Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367 Index 371 ntroduction 1 Part 1: Getting Started with Cybersecurity 5 Chapter 1: What Exactly Is Cybersecurity? 7 Chapter 2: Getting to Know Common Cyberattacks 23 Chapter 3: The Bad Guys You Must Defend Against 49 Part 2: Improving Your Own Personal Security 69 Chapter 4: Evaluating Your Current Cybersecurity Posture 71 Chapter 5: Enhancing Physical Security 93 Chapter 6: Cybersecurity Considerations When Working from Home 105 Part 3: Protecting Yourself from Yourself 115 Chapter 7: Securing Your Accounts 117 Chapter 8: Passwords 135 Chapter 9: Preventing Social Engineering Attacks 151 Part 4: Cybersecurity for Businesses, Organizations, and Government 173 Chapter 10: Securing Your Small Business 175 Chapter 11: Cybersecurity and Big Businesses 201 Part 5: Handling a Security Incident (This Is a When, Not an If) 217 Chapter 12: Identifying a Security Breach 219 Chapter 13: Recovering from a Security Breach 239 Part 6: Backing Up and Recovery 259 Chapter 14: Backing Up 261 Chapter 15: Resetting Your Device 289 Chapter 16: Restoring from Backups 299 Part 7: Looking toward the Future 321 Chapter 17: Pursuing a Cybersecurity Career 323 Chapter 18: Emerging Technologies Bring New Threats 337 Part 8: The Part of Tens 351 Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353 Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359 Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367 Index 371ReviewsAuthor InformationJoseph Steinberg is a master of cybersecurity. He is one of very few people to hold the suite of security certifications including: CISSP®, ISSAP®, ISSMP®, and CSSLP®. Joseph has written several books on cybersecurity, including the previous edition of Cybersecurity For Dummies. He is currently a consultant on information security, and serves as an expert witness in related matters. Tab Content 6Author Website:Countries AvailableAll regions |