Syndetics cover image
Image from Syndetics

Computer Security : QuickStudy Reference Guide.

By: Material type: TextTextPublisher: Boca Raton : BarCharts, Inc., 2014Copyright date: ©2014Description: 1 online resource (6 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781423223573
Genre/Form: Additional physical formats: Print version:: Computer Security : QuickStudy Reference GuideOnline resources:
Contents:
Introduction -- Using This Guide -- Related Terminology -- Threats -- Malware -- Related Terminology: Malware -- Malware: Types -- Malware: Website Infection -- Social Engineering -- Impersonation -- Shoulder Surfing -- Spam -- Phishing -- Characteristics of Phishing Scams -- Examples of Phishing Scams -- Prevention & Protection -- Security Plan -- Security Responsibilities -- Security vs. Usability -- Security Practices & Education -- Safe Browsing Practices -- Browser Settings -- Email Practices -- Login & Password Security -- Software Installation Awareness -- Software & Driver Updates -- Update the Operating System -- Update Installed Software -- Updating Hardware Drivers -- BIOS Updates -- Antivirus -- How to Choose -- Basic Antivirus Features -- Mid-Level Antivirus Features -- Advanced Antivirus Features -- Free or Paid -- Network Security -- Related Terminology: NetworkSecurity -- Introduction to Networks -- Wireless Networks (Wi-Fi) at Home -- Public Security -- Physical Device Security -- Wireless Networks (Wi-Fi) in Public -- Smart Surfing -- Handling Especially Sensitive Data -- Recovering a Stolen Device -- How to Google -- Additional Resources -- Trustworthy Websites -- Worth Noting.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Ebrary Online Books Ebrary Online Books Colombo Available CBERA000206
Ebrary Online Books Ebrary Online Books Jaffna Available JFEBRA000206
Ebrary Online Books Ebrary Online Books Kandy Available KDEBRA000206
Total holds: 0

Introduction -- Using This Guide -- Related Terminology -- Threats -- Malware -- Related Terminology: Malware -- Malware: Types -- Malware: Website Infection -- Social Engineering -- Impersonation -- Shoulder Surfing -- Spam -- Phishing -- Characteristics of Phishing Scams -- Examples of Phishing Scams -- Prevention & Protection -- Security Plan -- Security Responsibilities -- Security vs. Usability -- Security Practices & Education -- Safe Browsing Practices -- Browser Settings -- Email Practices -- Login & Password Security -- Software Installation Awareness -- Software & Driver Updates -- Update the Operating System -- Update Installed Software -- Updating Hardware Drivers -- BIOS Updates -- Antivirus -- How to Choose -- Basic Antivirus Features -- Mid-Level Antivirus Features -- Advanced Antivirus Features -- Free or Paid -- Network Security -- Related Terminology: NetworkSecurity -- Introduction to Networks -- Wireless Networks (Wi-Fi) at Home -- Public Security -- Physical Device Security -- Wireless Networks (Wi-Fi) in Public -- Smart Surfing -- Handling Especially Sensitive Data -- Recovering a Stolen Device -- How to Google -- Additional Resources -- Trustworthy Websites -- Worth Noting.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.