Amazon cover image
Image from Amazon.com

Cybersecurity for dummies

by Steinberg, Joseph (Cybersecurity expert) [author.].
Material type: materialTypeLabelBookPublisher: Hoboken, New Jersey : John Wiley & Sons, Inc., 2019Description: 384 pages.ISBN: 9781119560326 (pbk.) :.Classification number: 005.8 STESubject(s): Computer security | Computer networks -- Security measures | Computers and IT | Computers and ITSummary: Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being 'cyber-secure' means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked. If keeping your business or your family safe from cybersecurity threats is on your to-do list, 'Cybersecurity For Dummies' will introduce you to the basics of becoming cyber-secure. You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Book - Adult Paperback Formby Library Adult Non-Fiction 005.8 STE (Browse shelf(Opens below)) Checked out 28/10/2024 003034535X
Total holds: 0

Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being 'cyber-secure' means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked. If keeping your business or your family safe from cybersecurity threats is on your to-do list, 'Cybersecurity For Dummies' will introduce you to the basics of becoming cyber-secure. You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached.

Specialized.

There are no comments on this title.

to post a comment.