Browse all books

Books with title Cybersecurity: Protecting Your Identity and Data

  • Cybersecurity: Protecting Your Identity and Data

    Mary-Lane Kamberg

    Paperback (Rosen Publishing Group, Jan. 15, 2018)
    Internet security breaches have been in the news of late. Organizations, governments, businesses, and individual internet users are all at risk. This book introduces readers to the importance of cybersecurity and addresses the current risks from hackers, viruses and other malware, identity thieves, and other online perils. It provides concrete measures that young digital natives can take to protect themselves and their computers, smartphones, and other devices. This volume's lively, cautionary narrative and useful tips will help readers effectively defend their identities and data.
    Q
  • Cybersecurity: Protecting Your Identity and Data

    Mary-Lane Kamberg

    Library Binding (Rosen Publishing Group, Jan. 15, 2018)
    Internet security breaches have been in the news of late. Organizations, governments, businesses, and individual internet users are all at risk. This book introduces readers to the importance of cybersecurity and addresses the current risks from hackers, viruses and other malware, identity thieves, and other online perils. It provides concrete measures that young digital natives can take to protect themselves and their computers, smartphones, and other devices. This volume's lively, cautionary narrative and useful tips will help readers effectively defend their identities and data.
    Q
  • Sailing Safe in Cyberspace: Protect Your Identity and Data

    Anjali Kaushik

    eBook (Sage Publications Pvt. Ltd, June 30, 2013)
    Sailing Safe in Cyberspace is an excellent resource on safe computing. It gives in-depth exposure to the various ways in which security of information might be compromised, how cybercrime markets work and measures that can be taken to ensure safety at individual and organizational levels. Cyber security is not just a technical subject that can be resolved like any other IT-related problem—it is a ‘risk’ that can be mitigated by creating awareness and getting the right combination of technology and practices based on careful analysis. This book combines insights on cybersecurity from academic research, media reports, vendor reports, practical consultation and research experience.The first section of the book discusses motivation and types of cybercrimes that can take place. The second lists the major types of threats that users might encounter. The third discusses the impact, trend and role of the government in combating cybercrime. The fourth section of the book tells the readers about ways to protect themselves and secure their data/information stored in computers and the cyberspace. It concludes by offering suggestions for building a secure cyber environment.
  • Sailing Safe in Cyberspace: Protect Your Identity and Data

    Anjali Kaushik

    Paperback (SAGE Publications Pvt. Ltd, Aug. 6, 2013)
    Sailing Safe in Cyberspace is an excellent resource on safe computing. It gives in-depth exposure to the various ways in which security of information might be compromised, how cybercrime markets work and measures that can be taken to ensure safety at individual and organizational levels. Cyber security is not just a technical subject that can be resolved like any other IT-related problem―it is a ‘risk’ that can be mitigated by creating awareness and getting the right combination of technology and practices based on careful analysis. This book combines insights on cybersecurity from academic research, media reports, vendor reports, practical consultation and research experience. The first section of the book discusses motivation and types of cybercrimes that can take place. The second lists the major types of threats that users might encounter. The third discusses the impact, trend and role of the government in combating cybercrime. The fourth section of the book tells the readers about ways to protect themselves and secure their data/information stored in computers and the cyberspace. It concludes by offering suggestions for building a secure cyber environment.