LEADER 04954nam 22007095 450 001 9910647773403321 005 20251008163522.0 010 $a1-4842-9036-4 024 7 $a10.1007/978-1-4842-9036-1 035 $a(MiAaPQ)EBC7191442 035 $a(Au-PeEL)EBL7191442 035 $a(CKB)26089875800041 035 $a(OCoLC)1369033627 035 $a(OCoLC-P)1369033627 035 $a(DE-He213)978-1-4842-9036-1 035 $a(PPN)268209626 035 $a(Perlego)4515898 035 $a(CaSebORM)9781484290361 035 $a(EXLCZ)9926089875800041 100 $a20230203d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFirewalls Don't Stop Dragons $eA Step-by-Step Guide to Computer Security and Privacy for Non-Techies /$fby Carey Parker 205 $a5th ed. 2023. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2023. 215 $a1 online resource (609 pages) 300 $aIncludes index. 311 08$a1-4842-9035-6 327 $aChapter 1: Before We Begin -- Chapter 2: Cybersecurity 101 -- Chapter 3: First Things First -- Chapter 4: Passwords -- Chapter 5: Computer Security -- Chapter 6: Lan Sweet Lan -- Chapter 7: Practice Safe Surfing -- Chapter 8: Secure Communication -- Chapter 9: Online Accounts and Social Media -- Chapter 10: Parental Guidance -- Chapter 11: Don?t Be a Smart Phone Dummy -- Chapter 12: Odds and Ends -- Chapter 13: Parting Thoughts -- Chapter 14: Glossary. 330 $aRely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers will find many useful tips here. This book contains everything you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Protecting your digital domain is much like defending a medieval castle. Wide moats, towering walls and trained guards provide defense in depth, safeguarding the people and property within against the most common threats. But attempting to dragon-proof your castle would be counterproductive and costly. The goal of this book is to keep your devices and data safe from the most likely and impactful hazards - not a targeted attack by the NSA. Like wearing seat belts and sunscreen in the real world, there are dozens of simple, effective precautions we need to take in the virtual world. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what you need to do, each chapter includes a detailed checklist of expert tips. But the book also explains why you need to do these things, using entertaining analogies and straightforward explanations. This revised and expanded fifth edition includes: Updated for Windows 11, macOS 13 (Ventura), iOS 16 and Android 13. Updated recommendations for most secure and private products. Over 200 tips with complete step-by-step instructions and screenshots. What You Will Learn Maximize your computer and smartphone security. Minimize your vulnerabilities and data footprint. Solve your password problems and use two-factor authentication. Browse the web safely and confidently with a secure, private browser. Shop and bank online with maximum security and peace of mind. Defend against identity theft, ransomware and online scams. Safeguard your children online, at home and in school. Block online tracking, data mining and malicious online ads. Send files and messages with end-to-end encryption. Secure your home network and keep your smart devices from spying on you. Create automated backups of all your devices. Learn how to deal with account hacks, data. breaches and viruses. Understand how computers, the internet, VPNs and encryption really work And much more! 606 $aData protection 606 $aData protection$xLaw and legislation 606 $aComputer networks$xSecurity measures 606 $aComputer security 606 $aComputer crimes 606 $aData and Information Security 606 $aPrivacy 606 $aMobile and Network Security 606 $aPrinciples and Models of Security 606 $aComputer Crime 615 0$aData protection. 615 0$aData protection$xLaw and legislation. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security. 615 0$aComputer crimes. 615 14$aData and Information Security. 615 24$aPrivacy. 615 24$aMobile and Network Security. 615 24$aPrinciples and Models of Security. 615 24$aComputer Crime. 676 $a005.8 700 $aParker$b Carey$0897065 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910647773403321 996 $aFirewalls don't stop dragons$92004364 997 $aUNINA