000 | 06271nam a22003017a 4500 | ||
---|---|---|---|
999 |
_c64208 _d64208 |
||
003 | CITU | ||
005 | 20250127102943.0 | ||
008 | 210514b ||||| |||| 00| 0 eng d | ||
020 | _a9780124166509 | ||
041 | _aeng | ||
100 | 1 |
_aSammons, John, _eauthor. |
|
245 | 1 | 0 |
_aThe basics of cyber safety : _bcomputer and mobile device safety made easy / _cJohn Sammons and Michael Cross. |
264 | 1 |
_aCambridge, MA : _bSyngress, _cc2017. |
|
300 |
_axv, 237 pages : _billustrations ; _c24 cm |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
500 | _aAbout the Author John Sammons John Sammons is an Associate Professor and Director of the undergraduate program in Digital Forensics and Information Assurance at Marshall University in Huntington, West Virginia. John teaches digital forensics, electronic discovery, information security and technology in the School of Forensic and Criminal Justices Sciences. He's also adjunct faculty with the Marshall University graduate forensic science program where he teaches the advanced digital forensics course. John, a former police officer, is also an Investigator with the Cabell County Prosecuting Attorney?s Office and a member of the West Virginia Internet Crimes Against Children Task Force. He is a Member of the American Academy of Forensic Sciences, the High Technology Crime Investigation Association, and Infragard. John is the founder and President of the Appalachian Institute of Digital Evidence. AIDE is a non-profit organization that provides research and training for digital evidence professionals including attorneys, judges, law enforcement and information security practitioners in the private sector. He is the author of best-selling book, The Basics of Digital Forensics published by Syngress. Affiliations and Expertise Associate Professor and Director of the Digital Forensics and Information Assurance program, Marshall University, Huntington, WV, USA Michael Cross Michael Cross is a SharePoint Administrator and Developer, and has worked in the areas of software development, Web design, hardware installation/repairs, database administration, graphic design, and network administration. Working for law enforcement, he is part of an Information Technology team that provides support to over 1,000 civilian and uniformed users. His theory is that when the users carry guns, you tend to be more motivated in solving their problems. Affiliations and Expertise SharePoint ‎Administrator / Developer, Former Computer Forensic Examiner with Police Services in the Niagara Region of Ontario, Canada | ||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aTable of Contents Dedication About the Authors Acknowledgments Chapter 1. What is cyber safety? Abstract What Is Cyber Safety? Paying Attention to What?s Out There Privacy Encryption Monitoring Online Activity Identifying the Devices You Use, and Where You Use Them Using Different Windows Accounts Physical Security Summary Further Reading Chapter 2. Before connecting to the Internet Abstract Securing Your Web Browser Wi-fi Security and Safety Passwords Firewalls Summary Reference Chapter 3. Software problems and solutions Abstract Malware and Viruses Antivirus Windows Defender Antimalware Staying Up-To-Date Disaster Recovery Summary Reference Chapter 4. Email safety and security Abstract Email Protection Gmail Security Summary Chapter 5. Cybercrime Abstract What Is a Cybercriminal? Identity Theft Social Engineering Hacking Scams Summary References Chapter 6. Protecting yourself on social media Abstract What Is Social Media? Securing Social Media Securing Facebook Securing Twitter Securing YouTube Summary References Chapter 7. Finding a job online Abstract Looking for Work Online Online Resumes Work-at-Home Scams Securing LinkedIn Summary References Chapter 8. Protecting your reputation Abstract Finding Yourself Maintaining Privacy Think Twice, Post Once The Real World and Cyberspace What to Do After a Security Breach Digital Legacies Summary References Chapter 9. Beyond technology?dealing with people Abstract Netiquette Anonymity Annoying and Abusive People Online Chat Online Dating Meeting People in Person Protecting Yourself Summary References Chapter 10. Protecting your kids Abstract Protecting Your Kids Passwords for Kids Search Engines Parental Controls Location Talking About What?s Inappropriate Cyberbullying Online Predators Privacy Summary References Index | |
520 | _aDescription The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to?or themselves?secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online. Key Features Provides the most straightforward and up-to-date guide to cyber safety for anyone who ventures online for work, school, or personal use Includes real world examples that demonstrate how cyber criminals commit their crimes, and what users can do to keep their data safe | ||
650 | 0 | _aComputer security. | |
650 | 0 | _aCyber intelligence (Computer security) | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 |
_aInternet _xSecurity measures. |
|
700 | 1 |
_aCross, Michael, _eauthor. |
|
942 |
_2ddc _cBK _02 |