The basics of cyber safety : (Record no. 64208)

000 -LEADER
fixed length control field 06271nam a22003017a 4500
003 - CONTROL NUMBER IDENTIFIER
control field CITU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250127102943.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210514b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780124166509
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
100 1# - MAIN ENTRY--PERSONAL NAME
Preferred name for the person Sammons, John,
Relator term author.
245 10 - TITLE STATEMENT
Title The basics of cyber safety :
Remainder of title computer and mobile device safety made easy /
Statement of responsibility, etc John Sammons and Michael Cross.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Cambridge, MA :
Name of publisher, distributor, etc Syngress,
Date of publication, distribution, etc c2017.
300 ## - PHYSICAL DESCRIPTION
Extent xv, 237 pages :
Other physical details illustrations ;
Dimensions 24 cm
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
500 ## - GENERAL NOTE
General note About the Author<br/>John Sammons<br/><br/>John Sammons is an Associate Professor and Director of the undergraduate program in Digital Forensics and Information Assurance at Marshall University in Huntington, West Virginia. John teaches digital forensics, electronic discovery, information security and technology in the School of Forensic and Criminal Justices Sciences. He's also adjunct faculty with the Marshall University graduate forensic science program where he teaches the advanced digital forensics course. John, a former police officer, is also an Investigator with the Cabell County Prosecuting Attorney?s Office and a member of the West Virginia Internet Crimes Against Children Task Force. He is a Member of the American Academy of Forensic Sciences, the High Technology Crime Investigation Association, and Infragard.<br/><br/>John is the founder and President of the Appalachian Institute of Digital Evidence. AIDE is a non-profit organization that provides research and training for digital evidence professionals including attorneys, judges, law enforcement and information security practitioners in the private sector. He is the author of best-selling book, The Basics of Digital Forensics published by Syngress.<br/>Affiliations and Expertise<br/><br/>Associate Professor and Director of the Digital Forensics and Information Assurance program, Marshall University, Huntington, WV, USA<br/>Michael Cross<br/><br/>Michael Cross is a SharePoint Administrator and Developer, and has worked in the areas of software development, Web design, hardware installation/repairs, database administration, graphic design, and network administration. Working for law enforcement, he is part of an Information Technology team that provides support to over 1,000 civilian and uniformed users. His theory is that when the users carry guns, you tend to be more motivated in solving their problems. <br/>Affiliations and Expertise<br/><br/>SharePoint ‎Administrator / Developer, Former Computer Forensic Examiner with Police Services in the Niagara Region of Ontario, Canada
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - CONTENTS
Formatted contents note Table of Contents<br/><br/> Dedication<br/> About the Authors<br/> Acknowledgments<br/> Chapter 1. What is cyber safety?<br/> Abstract<br/> What Is Cyber Safety?<br/> Paying Attention to What?s Out There<br/> Privacy<br/> Encryption<br/> Monitoring Online Activity<br/> Identifying the Devices You Use, and Where You Use Them<br/> Using Different Windows Accounts<br/> Physical Security<br/> Summary<br/> Further Reading<br/> Chapter 2. Before connecting to the Internet<br/> Abstract<br/> Securing Your Web Browser<br/> Wi-fi Security and Safety<br/> Passwords<br/> Firewalls<br/> Summary<br/> Reference<br/> Chapter 3. Software problems and solutions<br/> Abstract<br/> Malware and Viruses<br/> Antivirus<br/> Windows Defender<br/> Antimalware<br/> Staying Up-To-Date<br/> Disaster Recovery<br/> Summary<br/> Reference<br/> Chapter 4. Email safety and security<br/> Abstract<br/> Email Protection<br/> Gmail Security<br/> Summary<br/> Chapter 5. Cybercrime<br/> Abstract<br/> What Is a Cybercriminal?<br/> Identity Theft<br/> Social Engineering<br/> Hacking<br/> Scams<br/> Summary<br/> References<br/> Chapter 6. Protecting yourself on social media<br/> Abstract<br/> What Is Social Media?<br/> Securing Social Media<br/> Securing Facebook<br/> Securing Twitter<br/> Securing YouTube<br/> Summary<br/> References<br/> Chapter 7. Finding a job online<br/> Abstract<br/> Looking for Work Online<br/> Online Resumes<br/> Work-at-Home Scams<br/> Securing LinkedIn<br/> Summary<br/> References<br/> Chapter 8. Protecting your reputation<br/> Abstract<br/> Finding Yourself<br/> Maintaining Privacy<br/> Think Twice, Post Once<br/> The Real World and Cyberspace<br/> What to Do After a Security Breach<br/> Digital Legacies<br/> Summary<br/> References<br/> Chapter 9. Beyond technology?dealing with people<br/> Abstract<br/> Netiquette<br/> Anonymity<br/> Annoying and Abusive People<br/> Online Chat<br/> Online Dating<br/> Meeting People in Person<br/> Protecting Yourself<br/> Summary<br/> References<br/> Chapter 10. Protecting your kids<br/> Abstract<br/> Protecting Your Kids<br/> Passwords for Kids<br/> Search Engines<br/> Parental Controls<br/> Location<br/> Talking About What?s Inappropriate<br/> Cyberbullying<br/> Online Predators<br/> Privacy<br/> Summary<br/> References<br/> Index
520 ## - SUMMARY, ETC.
Summary, etc Description<br/><br/>The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history.<br/><br/>This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to?or themselves?secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.<br/>Key Features<br/><br/> Provides the most straightforward and up-to-date guide to cyber safety for anyone who ventures online for work, school, or personal use<br/> Includes real world examples that demonstrate how cyber criminals commit their crimes, and what users can do to keep their data safe
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyber intelligence (Computer security)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet
General subdivision Security measures.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Cross, Michael,
Relator term author.
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type BOOK
Issues (borrowed), all copies 2
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total Checkouts Full call number Barcode Date last seen Date checked out Cost, replacement price Price effective from Item type
          COLLEGE LIBRARY COLLEGE LIBRARY SUBJECT REFERENCE 2017-09-16 ALBASA 3150.00 48016 2 005.8 Sa458 2017 CITU-CL-48016 2025-02-12 2025-01-27 3150.00 2021-05-14 BOOK