SØG - mellem flere end 8 millioner bøger:
Viser: Cybersecurity All-In-One for Dummies
Cybersecurity All-in-One For Dummies Vital Source e-bog
Joseph Steinberg, Kevin Beaver, Ira Winkler og Ted Coombs
(2023)
Cybersecurity All-In-One for Dummies
Joseph Steinberg, Kevin Beaver, Ira Winkler og Ted Coombs
(2023)
Sprog: Engelsk
om ca. 10 hverdage
Detaljer om varen
- 1. Udgave
- Vital Source searchable e-book (Reflowable pages)
- Udgiver: John Wiley & Sons (Januar 2023)
- Forfattere: Joseph Steinberg, Kevin Beaver, Ira Winkler og Ted Coombs
- ISBN: 9781394152872
What is the size of the market: Tech security is a $150 billion business worldwide. Despite this spend, nearly 2/3rds of business report they have experienced some type of cyberattack over the past year.
Who are we targeting: This book provides an overview of cybersecurity measures that can be applied for business and personal use. Our primary target includes the audience of business owners and IT support pros who need a guide to making smart security choices and applying tools to defend their systems. The secondary audience includes personal technology users who have specific concerns about tech privacy and protection.
Bookshelf online: 5 år fra købsdato.
Bookshelf appen: ubegrænset dage fra købsdato.
Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 10 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)
Detaljer om varen
- Paperback: 720 sider
- Udgiver: John Wiley & Sons, Limited (Januar 2023)
- Forfattere: Joseph Steinberg, Kevin Beaver, Ira Winkler og Ted Coombs
- ISBN: 9781394152858
Over 700 pages of insight into all things cybersecurity
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems--and explains why doing so is more important now than ever. Dig in for info on what kind of risks are out there, how to protect a variety of devices, strategies for testing your security, securing cloud data, and steps for creating an awareness program in an organization.
- Explore the basics of cybersecurity at home and in business
- Learn how to secure your devices, data, and cloud-based assets
- Test your security to find holes and vulnerabilities before hackers do
- Create a culture of cybersecurity throughout an entire organization
This For Dummies All-in-One is a stellar reference for business owners and IT support pros who need a guide to making smart security choices. Any tech user with concerns about privacy and protection will also love this comprehensive guide.
1: Cybersecurity Basics 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49 Book
2: Personal Cybersecurity 69
Chapter 1: Evaluating Your Current Cybersecurity Posture 71
Chapter 2: Enhancing Physical Security 93
Chapter 3: Cybersecurity Considerations When Working from Home 103
Chapter 4: Securing Your Accounts 113
Chapter 5: Passwords 131
Chapter 6: Preventing Social Engineering Attacks 147 Book
3: Securing a Business 169
Chapter 1: Securing Your Small Business 171
Chapter 2: Cybersecurity and Big Businesses 195
Chapter 3: Identifying a Security Breach 211
Chapter 4: Recovering from a Security Breach 229
Chapter 5: Backing Up 249
Chapter 6: Resetting Your Device 277
Chapter 7: Restoring from Backups 287 Book
4: Securing the Cloud 311
Chapter 1: Clouds Aren't Bulletproof 313
Chapter 2: Getting Down to Business 333
Chapter 3: Developing Secure Software 349
Chapter 4: Restricting Access 377
Chapter 5: Implementing Zero Trust 407
Chapter 6: Using Cloud Security Services 429 Book
5: Testing Your Security 451
Chapter 1: Introduction to Vulnerability and Penetration Testing 453
Chapter 2: Cracking the Hacker Mindset 473
Chapter 3: Developing Your Security Testing Plan 485
Chapter 4: Hacking Methodology 497
Chapter 5: Information Gathering 507
Chapter 6: Social Engineering 513
Chapter 7: Physical Security 529 Book
6: Enhancing Cybersecurity Awareness 541
Chapter 1: Knowing How Security Awareness Programs Work 543
Chapter 2: Creating a Security Awareness Strategy 553
Chapter 3: Determining Culture and Business Drivers 559
Chapter 4: Choosing the Best Tools for the Job 573
Chapter 5: Measuring Performance 589
Chapter 6: Assembling Your Security Awareness Program 601
Chapter 7: Running Your Security Awareness Program 621
Chapter 8: Implementing Gamification 641 Index 655