Firewalls don't stop dragons: a step-by-step guide to computer security for non-techies
Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably do...
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
[New York, NY]
Apress
[2020]
|
Edition: | Fourth edition. |
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781484261897/?ar |
Summary: | Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't know. Computers and the Internet have revolutionized the modern world, but if you are like most people, you have no clue how these things work and don't know the real threats. Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you would go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it is about arming yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data-just like wearing a seat belt, installing smoke alarms, and putting on sunscreen. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. This revised and expanded fourth edition contains more than 170 tips to make you and your family safer. It includes: Updates for Windows 10 (May 2020) and Mac OS 10.15 (Catalina) Updates for iOS 13 and Android 10 Updated recommendations on the best apps, products, and services More than 170 tips with complete step-by-step instructions and pictures A preview of Mac OS 11 Big Sur and iOS 14 What You Will Learn Create killer passwords that you do not have to remember Browse the web safely and with confidence Protect your data and reclaim your privacy Shop and bank online with maximum security Defend against identity theft Protect yourself from viruses and scams Maximize your smartphone security and privacy Safeguard your children online Block online tracking and dangerous ads Send files and messages securely and privately Set up secure home networking Keep your smart devices from spying on you Stop oversharing on social media Create automated backups of all your devices Learn how the Internet actually works And more! Who This Book Is For Those who use computers and mobile devices, but do not know (or care) how they work. The book is for people who want to know what they need to do to protect themselves-step by step, without judgment, and wit ... |
Item Description: | Includes bibliographical references and index. - Online resource; title from digital title page (viewed on October 28, 2020) |
Physical Description: | 1 online resource |
ISBN: | 9781484261897 1484261895 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-056581904 | ||
003 | DE-627-1 | ||
005 | 20240228121143.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200916s2020 xx |||||o 00| ||eng c | ||
020 | |a 9781484261897 |c electronic book |9 978-1-4842-6189-7 | ||
020 | |a 1484261895 |c electronic book |9 1-4842-6189-5 | ||
035 | |a (DE-627-1)056581904 | ||
035 | |a (DE-599)KEP056581904 | ||
035 | |a (ORHE)9781484261897 | ||
035 | |a (DE-627-1)056581904 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Parker, Carey |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Firewalls don't stop dragons |b a step-by-step guide to computer security for non-techies |c Carey Parker |
250 | |a Fourth edition. | ||
264 | 1 | |a [New York, NY] |b Apress |c [2020] | |
300 | |a 1 online resource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Online resource; title from digital title page (viewed on October 28, 2020) | ||
520 | |a Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't know. Computers and the Internet have revolutionized the modern world, but if you are like most people, you have no clue how these things work and don't know the real threats. Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you would go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it is about arming yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data-just like wearing a seat belt, installing smoke alarms, and putting on sunscreen. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. This revised and expanded fourth edition contains more than 170 tips to make you and your family safer. It includes: Updates for Windows 10 (May 2020) and Mac OS 10.15 (Catalina) Updates for iOS 13 and Android 10 Updated recommendations on the best apps, products, and services More than 170 tips with complete step-by-step instructions and pictures A preview of Mac OS 11 Big Sur and iOS 14 What You Will Learn Create killer passwords that you do not have to remember Browse the web safely and with confidence Protect your data and reclaim your privacy Shop and bank online with maximum security Defend against identity theft Protect yourself from viruses and scams Maximize your smartphone security and privacy Safeguard your children online Block online tracking and dangerous ads Send files and messages securely and privately Set up secure home networking Keep your smart devices from spying on you Stop oversharing on social media Create automated backups of all your devices Learn how the Internet actually works And more! Who This Book Is For Those who use computers and mobile devices, but do not know (or care) how they work. The book is for people who want to know what they need to do to protect themselves-step by step, without judgment, and wit ... | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Firewalls (Computer security) | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Coupe-feu (Sécurité informatique) | |
650 | 4 | |a Computer security | |
650 | 4 | |a Firewalls (Computer security) | |
776 | 1 | |z 1484261887 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1484261887 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781484261897/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-056581904 |
---|---|
_version_ | 1833357045641773056 |
adam_text | |
any_adam_object | |
author | Parker, Carey |
author_facet | Parker, Carey |
author_role | aut |
author_sort | Parker, Carey |
author_variant | c p cp |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)056581904 (DE-599)KEP056581904 (ORHE)9781484261897 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Fourth edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04222cam a22004932c 4500</leader><controlfield tag="001">ZDB-30-ORH-056581904</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121143.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200916s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484261897</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-4842-6189-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484261895</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-4842-6189-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)056581904</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP056581904</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484261897</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)056581904</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Parker, Carey</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Firewalls don't stop dragons</subfield><subfield code="b">a step-by-step guide to computer security for non-techies</subfield><subfield code="c">Carey Parker</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Fourth edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[New York, NY]</subfield><subfield code="b">Apress</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from digital title page (viewed on October 28, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't know. Computers and the Internet have revolutionized the modern world, but if you are like most people, you have no clue how these things work and don't know the real threats. Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you would go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it is about arming yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data-just like wearing a seat belt, installing smoke alarms, and putting on sunscreen. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. This revised and expanded fourth edition contains more than 170 tips to make you and your family safer. It includes: Updates for Windows 10 (May 2020) and Mac OS 10.15 (Catalina) Updates for iOS 13 and Android 10 Updated recommendations on the best apps, products, and services More than 170 tips with complete step-by-step instructions and pictures A preview of Mac OS 11 Big Sur and iOS 14 What You Will Learn Create killer passwords that you do not have to remember Browse the web safely and with confidence Protect your data and reclaim your privacy Shop and bank online with maximum security Defend against identity theft Protect yourself from viruses and scams Maximize your smartphone security and privacy Safeguard your children online Block online tracking and dangerous ads Send files and messages securely and privately Set up secure home networking Keep your smart devices from spying on you Stop oversharing on social media Create automated backups of all your devices Learn how the Internet actually works And more! Who This Book Is For Those who use computers and mobile devices, but do not know (or care) how they work. The book is for people who want to know what they need to do to protect themselves-step by step, without judgment, and wit ...</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Firewalls (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coupe-feu (Sécurité informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Firewalls (Computer security)</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1484261887</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1484261887</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484261897/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-056581904 |
illustrated | Not Illustrated |
indexdate | 2025-05-28T09:45:27Z |
institution | BVB |
isbn | 9781484261897 1484261895 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Apress |
record_format | marc |
spelling | Parker, Carey VerfasserIn aut Firewalls don't stop dragons a step-by-step guide to computer security for non-techies Carey Parker Fourth edition. [New York, NY] Apress [2020] 1 online resource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Online resource; title from digital title page (viewed on October 28, 2020) Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't know. Computers and the Internet have revolutionized the modern world, but if you are like most people, you have no clue how these things work and don't know the real threats. Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you would go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it is about arming yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data-just like wearing a seat belt, installing smoke alarms, and putting on sunscreen. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. This revised and expanded fourth edition contains more than 170 tips to make you and your family safer. It includes: Updates for Windows 10 (May 2020) and Mac OS 10.15 (Catalina) Updates for iOS 13 and Android 10 Updated recommendations on the best apps, products, and services More than 170 tips with complete step-by-step instructions and pictures A preview of Mac OS 11 Big Sur and iOS 14 What You Will Learn Create killer passwords that you do not have to remember Browse the web safely and with confidence Protect your data and reclaim your privacy Shop and bank online with maximum security Defend against identity theft Protect yourself from viruses and scams Maximize your smartphone security and privacy Safeguard your children online Block online tracking and dangerous ads Send files and messages securely and privately Set up secure home networking Keep your smart devices from spying on you Stop oversharing on social media Create automated backups of all your devices Learn how the Internet actually works And more! Who This Book Is For Those who use computers and mobile devices, but do not know (or care) how they work. The book is for people who want to know what they need to do to protect themselves-step by step, without judgment, and wit ... Computer security Firewalls (Computer security) Computer Security Sécurité informatique Coupe-feu (Sécurité informatique) 1484261887 Erscheint auch als Druck-Ausgabe 1484261887 |
spellingShingle | Parker, Carey Firewalls don't stop dragons a step-by-step guide to computer security for non-techies Computer security Firewalls (Computer security) Computer Security Sécurité informatique Coupe-feu (Sécurité informatique) |
title | Firewalls don't stop dragons a step-by-step guide to computer security for non-techies |
title_auth | Firewalls don't stop dragons a step-by-step guide to computer security for non-techies |
title_exact_search | Firewalls don't stop dragons a step-by-step guide to computer security for non-techies |
title_full | Firewalls don't stop dragons a step-by-step guide to computer security for non-techies Carey Parker |
title_fullStr | Firewalls don't stop dragons a step-by-step guide to computer security for non-techies Carey Parker |
title_full_unstemmed | Firewalls don't stop dragons a step-by-step guide to computer security for non-techies Carey Parker |
title_short | Firewalls don't stop dragons |
title_sort | firewalls don t stop dragons a step by step guide to computer security for non techies |
title_sub | a step-by-step guide to computer security for non-techies |
topic | Computer security Firewalls (Computer security) Computer Security Sécurité informatique Coupe-feu (Sécurité informatique) |
topic_facet | Computer security Firewalls (Computer security) Computer Security Sécurité informatique Coupe-feu (Sécurité informatique) |
work_keys_str_mv | AT parkercarey firewallsdontstopdragonsastepbystepguidetocomputersecurityfornontechies |