000 03606cmm a22005655i 4500
001 ssj0001584596
003 OCoLC
005 20190729110412.0
006 m d
007 cr n
008 151016s2015 gw | eng d
020 _a9783319199535
020 _a9783319199528 (print)
024 7 _a10.1007/978-3-319-19953-5
_2doi
040 _dWaSeSS
_dUtOrBLW
_cMiTN
049 _aQEMP
050 4 _aQA76.9 .A25
_bP45 2015
072 7 _aPDZ
_2bicssc
072 7 _aTEC000000
_2bisacsh
082 0 4 _a600
_223
100 1 _aPelton, Joseph.
245 1 0 _aDigital Defense :
_bA Cybersecurity Primer /
_cby Joseph Pelton, Indu B. Singh.
250 _aFirst edition 2015.
260 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2015.
300 _aXX, 209 pages 42 illustrations, 36 illustrations in color :
_bonline resource.
336 _acomputer program
_bcop
_2rdacontent.
337 _acomputer
_bc
_2rdamedia.
338 _aonline resource
_bcr
_2rdacarrier.
347 _atext file
_bPDF
_2rda.
500 _aElectronic resource.
505 0 _aDo You Know Your Cyber Space? -- What Is at Stake -- Is Anyone Looking Out for You -- Ten Key Things to Protect -- Where to Go for Assistance -- Who Will Control the Future -- Ten Commandments for Your Cyber Defense -- Glossary.
520 _aDrs. Pelton and Singh warn of the increasing risks of cybercrime and lay out a series of commonsense precautions to guard against individual security breaches. This guide clearly explains the technology at issue, the points of weakness, and the best ways to proactively monitor and maintain the integrity of individual networks. Covering both the most common personal attacks of identity fraud, phishing, malware, and breach of access as well as the larger threats against companies and governmental systems, the authors explain the vulnerabilities of the internet age. As more and more of life's transactions take place online, the average computer user and society at large have a lot to lose. All users can take steps to secure their information. Cybercrime is so subtle and hidden, people can ignore the threat until it is too late. Yet today about every three seconds a person is hit by some form of cyberattack out of the blue. Locking the cyber-barn door after a hacker has struck is way too late. Cybersecurity, cybercrime, and cyberterrorism may seem to be intellectual crimes that don't really touch the average person, but the threat is real. Demystifying them is the most important step, and this accessible explanation covers all the bases.
650 0 _aPopular works.
650 0 _aComputer security.
_0http://id.loc.gov/authorities/subjects/sh90001862.
650 0 _aTechnology.
_0http://id.loc.gov/authorities/subjects/sh85133147.
650 0 _aElectrical engineering.
_0http://id.loc.gov/authorities/subjects/sh85041666.
650 1 4 _aPopular Science.
650 2 4 _aPopular Science in Technology.
650 2 4 _aSystems and Data Security.
650 2 4 _aCommunications Engineering, Networks.
655 0 _aElectronic books.
700 1 _aSingh, Indu B.
710 2 _aSpringerLink (Online service)
_0http://id.loc.gov/authorities/names/no2005046756.
773 0 _tSpringer eBooks.
776 0 8 _iPrinted edition:
_z9783319199528.
856 4 0 _uhttp://ezproxy.msu.edu/login?url=http://link.springer.com/openurl?genre=book&isbn=978-3-319-19952-8
_zConnect to online resource via SpringerLINK ebooks - English/International Collection (2015) - All users
596 _a1
948 _au609543
903 _a33015
999 _c33015
_d33015