LEADER 03431nam 2200529 450 001 9910467494003321 005 20200520144314.0 010 $a1-5015-0636-6 010 $a1-5015-0650-1 024 7 $a10.1515/9781501506505 035 $a(CKB)4100000007389735 035 $a(MiAaPQ)EBC5157542 035 $a(DE-B1597)479830 035 $a(OCoLC)1083582177 035 $a(DE-B1597)9781501506505 035 $a(Au-PeEL)EBL5157542 035 $a(EXLCZ)994100000007389735 100 $a20181019h20192019 uy| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aUnderstanding security issues /$fScott E. Donaldson, Chris K. Williams, and Stanley G. Siegel 210 1$aBoston :$cWalter de Gruyter Incorporated,$d[2019] 210 4$d©2019 215 $a1 online resource (208 pages) $cillustrations 300 $aIncludes index. 311 $a1-5015-1523-3 327 $tFrontmatter --$tAbout DeG PRESS --$tAcknowledgments --$tAbout the Authors --$tContents --$tIntroduction --$tChapter 1. Security Mindset --$tChapter 2. Common Cybersecurity Attacks --$tChapter 3. Protecting Your Computer(s) --$tChapter 4. Protecting Your Passwords --$tChapter 5. Protecting Your Home Network --$tChapter 6. Smartphones and Tablets --$tChapter 7. Protecting Your Web Browsing --$tChapter 8. Protecting Your E-Mail and Phone Calls --$tChapter 9. Protecting Your Identity, Privacy, and Family Online --$tChapter 10. Protecting Yourself on Travel --$tChapter 11. When Things Go Wrong --$tChapter 12. Considering Cybersecurity at Work --$tChapter 13. Final Thoughts --$tAppendix A. Common Online Scams --$tAppendix B. The Worst Passwords Ever --$tAppendix C. Online Security Resources --$tGlossary --$tIndex 330 $aWith the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides a solid understanding of the threats, and focuses on useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go.? This book discusses security awareness issues and how you can take steps to reduce the risk of becoming a victim: The threats that face every individual and business, all the time. Specific indicators of threats so that you understand when you might be attacked and what to do if they occur. The security mindset and good security practices. Assets that need to be protected at work and at home. Protecting yourself and your business at work. Protecting yourself and your family at home. Protecting yourself and your assets on travel. 606 $aComputer security 606 $aComputer networks$xSecurity measures 608 $aElectronic books. 615 0$aComputer security. 615 0$aComputer networks$xSecurity measures. 676 $a005.8 700 $aDonaldson$b Scott E.$0959977 702 $aWilliams$b Chris K. 702 $aSiegel$b Stanley G. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910467494003321 996 $aUnderstanding security issues$92462258 997 $aUNINA LEADER 01247nam a2200361 i 4500 001 991001934099707536 008 061106s2006 mau b 001 0 eng d 020 $a376437618X 024 3 $a9783764376185 035 $ab1345030x-39ule_inst 040 $aDip.to Matematica$beng 082 00$a516.36$222 084 $aAMS 53B05 084 $aAMS 53B99 084 $aAMS 53C05 084 $aAMS 53C80 084 $aAMS 53C99 084 $aLC QA641.I45 100 1 $aIliev, Bozhidar Zakhariev$0624601 245 10$aHandbook of normal frames and coordinates /$cBozhidar Z. Iliev 260 $aBoston ;$aBasel; $aBerlin :$bBirkhäuser,$cc2006 300 $axv, 441 p. ;$c24 cm 440 0$aProgress in mathematical physics ;$v42 504 $aIncludes bibliographical references and index 650 0$aGeometry, Differential 650 0$aGlobal differential geometry 650 0$aCoordinates 907 $a.b1345030x$b02-04-14$c06-11-06 912 $a991001934099707536 945 $aLE013 53B ILI11 (2006)$g1$i2013000204178$lle013$op$pE101.92$q-$rl$s- $t0$u1$v0$w1$x0$y.i14326577$z27-11-06 996 $aHandbook of normal frames and coordinates$91098838 997 $aUNISALENTO 998 $ale013$b06-11-06$cm$da $e-$feng$gmau$h0$i0