LEADER 02438nam 22005173 450 001 9910141717803321 005 20240308203003.0 010 $a3-7639-4509-1 035 $a(CKB)2560000000153641 035 $a(EBL)1661863 035 $a(SSID)ssj0001539212 035 $a(PQKBManifestationID)11879430 035 $a(PQKBTitleCode)TC0001539212 035 $a(PQKBWorkID)11531181 035 $a(PQKB)11120644 035 $a(MiAaPQ)EBC1661863 035 $a(MiAaPQ)EBC7387105 035 $a(Au-PeEL)EBL7387105 035 $a(EXLCZ)992560000000153641 100 $a20240308h20072007 uy 0 101 0 $ager 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aMeine Rechte als Azubi $eAlles was ich wissen muss: Vom Ausbildungsvertrag bis zum Zeugnis 205 $aFirst Edition. 210 1$aBielefeld :$cwbv Media GmbH & Co. KG,$d2007. 210 4$d©2007 215 $a1 online resource (142 p.) 300 $aDescription based upon print version of record. 311 $a3-7639-3507-X 327 $aInhalt; Vorwort; Einfu?hrung; Genau lesen lohnt sich! - Der Ausbildungsvertrag; Traumstart oder Fehlzu?ndung - Beginn der Ausbildung; Schneller am Ziel? Verku?rzung und Verla?ngerung der Ausbildungszeit; Daran musst du dich halten - Pflichten des Azubis; Auch fu?r den Ausbilder gibt es Regeln - Pflichten des Ausbilders; Ich war jung und brauchte das Geld - Ausbildungsvergu?tung und andere Zahlungen 330 $aWas steht Auszubildenden zu? Was wird mit Recht von ihnen erwartet? Und welches Verhalten ist in Konfliktsituationen angemessen? Was immer fu?r Azubis wa?hrend der Ausbildung an rechtlichen und finanziellen Belangen wichtig ist, findet man hier. So sind sie gut gewappnet, wenn wa?hrend der Ausbildung Probleme auftreten. Durch eine jugendgerechte Sprache und viele Praxisbeispiele sind die rechtlichen Regelungen auch fu?r Laien versta?ndlich. Biographische Informationen Jula Mu?ller arbeitet als Berufsberaterin im DGB-Jugendprojekt und schreibt fu?r das Online-Portal www.doktor-azu 606 $aApprenticeship programs 615 0$aApprenticeship programs. 676 $a331.11 676 $a331.110973 700 $aJula Mu?ller$01770358 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910141717803321 996 $aMeine Rechte als Azubi$94250542 997 $aUNINA LEADER 04954nam 22007095 450 001 9910647773403321 005 20251008163522.0 010 $a1-4842-9036-4 024 7 $a10.1007/978-1-4842-9036-1 035 $a(MiAaPQ)EBC7191442 035 $a(Au-PeEL)EBL7191442 035 $a(CKB)26089875800041 035 $a(OCoLC)1369033627 035 $a(OCoLC-P)1369033627 035 $a(DE-He213)978-1-4842-9036-1 035 $a(PPN)268209626 035 $a(Perlego)4515898 035 $a(CaSebORM)9781484290361 035 $a(EXLCZ)9926089875800041 100 $a20230203d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFirewalls Don't Stop Dragons $eA Step-by-Step Guide to Computer Security and Privacy for Non-Techies /$fby Carey Parker 205 $a5th ed. 2023. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2023. 215 $a1 online resource (609 pages) 300 $aIncludes index. 311 08$a1-4842-9035-6 327 $aChapter 1: Before We Begin -- Chapter 2: Cybersecurity 101 -- Chapter 3: First Things First -- Chapter 4: Passwords -- Chapter 5: Computer Security -- Chapter 6: Lan Sweet Lan -- Chapter 7: Practice Safe Surfing -- Chapter 8: Secure Communication -- Chapter 9: Online Accounts and Social Media -- Chapter 10: Parental Guidance -- Chapter 11: Don?t Be a Smart Phone Dummy -- Chapter 12: Odds and Ends -- Chapter 13: Parting Thoughts -- Chapter 14: Glossary. 330 $aRely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers will find many useful tips here. This book contains everything you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Protecting your digital domain is much like defending a medieval castle. Wide moats, towering walls and trained guards provide defense in depth, safeguarding the people and property within against the most common threats. But attempting to dragon-proof your castle would be counterproductive and costly. The goal of this book is to keep your devices and data safe from the most likely and impactful hazards - not a targeted attack by the NSA. Like wearing seat belts and sunscreen in the real world, there are dozens of simple, effective precautions we need to take in the virtual world. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what you need to do, each chapter includes a detailed checklist of expert tips. But the book also explains why you need to do these things, using entertaining analogies and straightforward explanations. This revised and expanded fifth edition includes: Updated for Windows 11, macOS 13 (Ventura), iOS 16 and Android 13. Updated recommendations for most secure and private products. Over 200 tips with complete step-by-step instructions and screenshots. What You Will Learn Maximize your computer and smartphone security. Minimize your vulnerabilities and data footprint. Solve your password problems and use two-factor authentication. Browse the web safely and confidently with a secure, private browser. Shop and bank online with maximum security and peace of mind. Defend against identity theft, ransomware and online scams. Safeguard your children online, at home and in school. Block online tracking, data mining and malicious online ads. Send files and messages with end-to-end encryption. Secure your home network and keep your smart devices from spying on you. Create automated backups of all your devices. Learn how to deal with account hacks, data. breaches and viruses. Understand how computers, the internet, VPNs and encryption really work And much more! 606 $aData protection 606 $aData protection$xLaw and legislation 606 $aComputer networks$xSecurity measures 606 $aComputer security 606 $aComputer crimes 606 $aData and Information Security 606 $aPrivacy 606 $aMobile and Network Security 606 $aPrinciples and Models of Security 606 $aComputer Crime 615 0$aData protection. 615 0$aData protection$xLaw and legislation. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security. 615 0$aComputer crimes. 615 14$aData and Information Security. 615 24$aPrivacy. 615 24$aMobile and Network Security. 615 24$aPrinciples and Models of Security. 615 24$aComputer Crime. 676 $a005.8 700 $aParker$b Carey$0897065 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910647773403321 996 $aFirewalls don't stop dragons$92004364 997 $aUNINA LEADER 01090nam0-2200277 --450 001 9911036680203321 005 20251121191223.0 100 $a20251110d1894----kmuy0itay5050 ba 101 0 $afre 102 $aFR 105 $af 001yy 200 1 $aFlore coloriée de poche à l'usage du touriste dans les montagnes de la Suisse, de la Savoie, du Dauphiné, des Pyrénées, du Jura, des Vosges, etc.$fpar H. Correvon$gdessins par A. Jobin 210 $aParis$cLibrairie des Sciences naturelles$d1894 215 $aXV, 163 p., 144 p. di tav.$cill.$d16 cm 225 1 $aBibliothèque de poche du naturaliste$v2 610 0 $aFlora alpina 610 0 $aAlpi$aFlora 676 $a581.9$v18$zita 700 1$aCorrevon,$bHenry$f<1854-1939>$01854029 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9911036680203321 952 $aE ARB 248$b03/4736/25$fFAGBC 959 $aFAGBC 996 $aFlore coloriée de poche à l'usage du touriste dans les montagnes de la Suisse, de la Savoie, du Dauphiné, des Pyrénées, du Jura, des Vosges, etc$94454320 997 $aUNINA