000 02830cam a2200361 i 4500
001 2012028121
003 DLC
005 20190729104953.0
008 120829s2013 flua b 000 0 eng
010 _a 2012028121
020 _a9781439856185 (pbk.)
040 _aDLC
_beng
_cDLC
_erda
_dDLC
_dMiTN
042 _apcc
049 _aEY8Z
050 0 0 _aQA76.9.A25
_bJ224 2013
082 0 0 _a005.8
_223
084 _aCOM053000
_aCOM083000
_2bisacsh
100 1 _aJacobson, Douglas.
245 1 0 _aComputer security literacy :
_bstaying safe in a digital world /
_cDouglas Jacobson and Joseph Idziorek.
264 1 _aBoca Raton :
_bCRC Press / Taylor & Francis Group,
_c[2013]
300 _axxiii, 344 pages :
_billustrations ;
_c24 cm
336 _atext
_2rdacontent
337 _aunmediated
_2rdamedia
338 _avolume
_2rdacarrier
520 _a"Preface Approach Traditional computer security books educate readers about a multitude of topics, ranging from secure programming practices, protocols, and algorithm designs to cryptography and ethics. These books typically focus on the implementation or theory of security controls and mechanisms at the application, operating system, network, and physical layers. Breaking this traditional model, "Computer Security Literacy: Staying Safe in a Digital World" instead seeks to educate the reader at the user layer and focuses on practical topics that one is likely to encounter on a regular basis. It has long been recognized that the user is in fact the weakest link in the security chain. So why not effect change by providing practical and relevant education for the normal user of information technology? As it turns out, we, the user, often have the greatest impact in the security of our computer and information as a result of the actions that we do or do not perform. This text provides practical security education to give the reader context to make sound security decisions. The outcomes of this book are as follows. The reader will be able to: - Define computer security terms and mechanisms - Describe fundamental security concepts - State computer security best practices - Describe the strengths, weaknesses, and limitations of security mechanisms and concepts - Give examples of common security threats, threat sources, and threat motivations - Explain their role in protecting their own computing environment and personal and confidential information - Discuss current event topics and read security articles in the popular press - Assess computing actions in the context of securit"--
_cProvided by publisher.
504 _aIncludes bibliographical references.
650 0 _aComputer security.
700 1 _aIdziorek, Joseph.
948 _au362656
949 _aQA76.9 .A25 J224 2013
_wLC
_c1
_hEY8Z
_i33039001269553
596 _a1
903 _a24259
999 _c24259
_d24259