Cybersecurity All-in-One For Dummies (eBook)

eBook Download: EPUB
2023 | 1. Auflage
720 Seiten
Wiley (Verlag)
978-1-394-15287-2 (ISBN)

Lese- und Medienproben

Cybersecurity All-in-One For Dummies -  Kevin Beaver,  Ted Coombs,  Joseph Steinberg,  Ira Winkler
Systemvoraussetzungen
32,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Over 700 pages of insight into all things cybersecurity Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems and explains why doing so is more important now than ever. Dig in for info on what kind of risks are out there, how to protect a variety of devices, strategies for testing your security, securing cloud data, and steps for creating an awareness program in an organization. Explore the basics of cybersecurity at home and in business Learn how to secure your devices, data, and cloud-based assets Test your security to find holes and vulnerabilities before hackers do Create a culture of cybersecurity throughout an entire organizationThis For Dummies All-in-One is a stellar reference for business owners and IT support pros who need a guide to making smart security choices. Any tech user with concerns about privacy and protection will also love this comprehensive guide.

This All-in-One gathers the expertise of the leading For Dummies authors in the world of cybersecurity, including Joseph Steinberg, author of Cybersecurity For Dummies; Kevin Beaver, author of Hacking For Dummies; Ted Coombs, author of Cloud Security For Dummies; and Ira Winkler, author of Security Awareness For Dummies.

Book 1: Cybersecurity Basics 5

Chapter 1: What Exactly Is Cybersecurity? 7

Chapter 2: Getting to Know Common Cyberattacks 23

Chapter 3: The Bad Guys You Must Defend Against 49

Book 2: Personal Cybersecurity 69

Chapter 1: Evaluating Your Current Cybersecurity Posture 71

Chapter 2: Enhancing Physical Security 93

Chapter 3: Cybersecurity Considerations When Working from Home 103

Chapter 4: Securing Your Accounts 113

Chapter 5: Passwords 131

Chapter 6: Preventing Social Engineering Attacks 147

Book 3: Securing a Business 169

Chapter 1: Securing Your Small Business 171

Chapter 2: Cybersecurity and Big Businesses 195

Chapter 3: Identifying a Security Breach 211

Chapter 4: Recovering from a Security Breach 229

Chapter 5: Backing Up 249

Chapter 6: Resetting Your Device 277

Chapter 7: Restoring from Backups 287

Book 4: Securing the Cloud 311

Chapter 1: Clouds Aren't Bulletproof 313

Chapter 2: Getting Down to Business 333

Chapter 3: Developing Secure Software 349

Chapter 4: Restricting Access 377

Chapter 5: Implementing Zero Trust 407

Chapter 6: Using Cloud Security Services 429

Book 5: Testing Your Security 451

Chapter 1: Introduction to Vulnerability and Penetration Testing 453

Chapter 2: Cracking the Hacker Mindset 473

Chapter 3: Developing Your Security Testing Plan 485

Chapter 4: Hacking Methodology 497

Chapter 5: Information Gathering 507

Chapter 6: Social Engineering 513

Chapter 7: Physical Security 529

Book 6: Enhancing Cybersecurity Awareness 541

Chapter 1: Knowing How Security Awareness Programs Work 543

Chapter 2: Creating a Security Awareness Strategy 553

Chapter 3: Determining Culture and Business Drivers 559

Chapter 4: Choosing the Best Tools for the Job 573

Chapter 5: Measuring Performance 589

Chapter 6: Assembling Your Security Awareness Program 601

Chapter 7: Running Your Security Awareness Program 621

Chapter 8: Implementing Gamification 641

Index 655

Erscheint lt. Verlag 4.1.2023
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Theorie / Studium
Schlagworte Computer Science • Computer Security & Cryptography • Computersicherheit • Computersicherheit u. Kryptographie • cybersecurity • Cybersicherheit • Informatik
ISBN-10 1-394-15287-6 / 1394152876
ISBN-13 978-1-394-15287-2 / 9781394152872
Haben Sie eine Frage zum Produkt?
EPUBEPUB (Adobe DRM)
Größe: 7,9 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99