a step-by-step guide to computer security for non-techies /
First Statement of Responsibility
Carey Parker.
EDITION STATEMENT
Edition Statement
Third edition.
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
New York :
Name of Publisher, Distributor, etc.
Apress,
Date of Publication, Distribution, etc.
2018.
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
1 online resource
INTERNAL BIBLIOGRAPHIES/INDEXES NOTE
Text of Note
Includes bibliographical references and index.
CONTENTS NOTE
Text of Note
Intro; Table of Contents; About the Author; About the Technical Reviewer; Preface; Chapter 1: Before We Begin; "How Worried Should I Be?"; Threat Analysis; Indirect Threats; Privacy vs. Security; Summary; How to Use This Book; Reader Prerequisites; Operating Systems Covered; Navigating the Checklists; Tip 1-1. Simple Tip; Tip 1-2. Tip with Steps; Tip 1-3. Tip with Variations; Tip 1-3a. Microsoft Windows 7; Tip 1-3b. Microsoft Windows 8.1/10; Tip 1-3c. Mac OS; Web Addresses and Staying Up-to-Date; Always Go to the Source; Feedback Welcome; Spread the Word; Not So Fast.
Text of Note
Chapter 2: Cybersecurity 101Here Be Dragons; I Dub Thee ... ; Prevention, Detection, and Recovery; Computer Lingo; Hardware and Software; File Manager; Bits and Bytes; Storage; Networks (Wired and Wireless); Bandwidth; Bluetooth; Clients and Servers; The Cloud; Net Neutrality; The Internet of Things; Know Your Enemy; Malware; Hardware Bugs; Exploit; How the Internet Works; Tools of the Trade; Encryption and Cryptanalysis; Modern Cryptography; Authentication and Message Integrity; Triple-A; Newer Isn't Always Better; Privacy and Tracking; Who Can You Trust?; Summary; Checklist.
Text of Note
Tip 2-1. Know ThyselfTip 2-2. Know What They Know; Chapter 3: The Three Ups: Back Up, Clean Up, and Update; Backups; Spring Cleaning; Update Everything; Summary; Checklist; Operating System Configuration; Microsoft Windows 7; Microsoft Windows 8.1; Microsoft Windows 10; Mac OS; Tip 3-1. Back Up to an External Drive; Buy an External Hard Drive; Connect the Drive to Your Computer; Configure Your Backup; Tip 3-1a. Microsoft Windows 7; Tip 3-1b. Microsoft Windows 8.1; Tip 3-1c. Microsoft Windows 10; Tip 3-1d. Mac OS; Tip 3-2. Back Up to the Cloud; Tip 3-3. Buy a UPS; Tip 3-4. Clean Up Your Apps.
Text of Note
Tip 3-4a. Microsoft Windows 7Tip 3-4b. Microsoft Windows 8.1; Tip 3-4c. Microsoft Windows 10; Tip 3-4d. Mac OS; Update Everything; Tip 3-5. Turn On Auto-Update for Your OS; Tip 3-5a. Microsoft Windows 7; Tip 3-5b. Microsoft Windows 8.1; Tip 3-5c. Microsoft Windows 10; Tip 3-5d. Mac OS; Tip 3-6. Update Adobe Flash (If You Really Need It); Tip 3-7. Update Java (If You Really Need It); Chapter 4: Passwords; How Did We Get Here?; Understanding Password Strength; Managing Your Passwords; Choosing a Master Password; Doing the Two-Step; Periodically Changing Passwords; Summary; Checklist.
Text of Note
Tip 4-1. Choose a Strong Master PasswordTip 4-2. Install LastPass on Your Computer; Tip 4-3. Install the LastPass App on Your Smartphone; Tip 4-4. Enable Two-Factor Authentication; Tip 4-5. Disallow LastPass Login from Foreign Countries; Tip 4-6. Create Some One-Time Passwords; Tip 4-7. Disable Password Saving on Your Browser; Tip 4-8. Perform a Security Check in LastPass; Tip 4-9. Generate Strong Passwords for Key Accounts; Tip 4-10. Use LastPass to Store Secure Notes; Tip 4-11. Generate and Store Offline Passwords; Tip 4-12. Use Throwaway Accounts; Chapter 5: Computer Security.
0
8
8
8
8
SUMMARY OR ABSTRACT
Text of Note
Just how secure is your computer? Protecting your computer is like defending a medieval castle: moats and castle guards can be effective, but you'd bankrupt the kingdom trying to build something dragon-proof. Parker shows you dozens of no-brainer things we should all be doing to protect our computers and safeguard our data.