Have You Been Hacked Yet?

Have You Been Hacked Yet?

Have You Been Hacked Yet?

N. Stakhanova & O. Stakhanov

35,27 €
IVA incluido
Consulta disponibilidad
Editorial:
N. Stakhanova & O. Stakhanov
Año de edición:
2017
Materia
Privacidad y protección de datos
ISBN:
978-84-253-4395-7
Páginas:
576
Encuadernación:
Otros

Selecciona una librería:

  • Librería Perelló (Valencia)
  • Librería Aciertas (Toledo)
  • El AlmaZen del Alquimista (Sevilla)
  • Librería Elías (Asturias)
  • Librería Kolima (Madrid)
  • Donde los libros
  • Librería Proteo (Málaga)

Do you or someone in your house:have a computer, an iPad, or a smartphone? browse the internet, use e-mail or have a Facebook, Twitter, LinkedIn or other social account? ordo online banking, or purchase things online? If your answer is "yes" to any of the above questions, than it's not a question of "if", but "when" cybercriminals will try to steal your or your loved ones' sensitive personal information and/or money. Millions of unsuspecting users around the globe are under hacking attack right at this moment. Their smartphones and e-mail boxes are bombarded with phishing messages. Their gadgets are constantly probed for vulnerabilities by specialized hacking tools. And countless malicious malware is attempting toinfect their computing devices. The gruesome reality of modern society is that ordinary users of information technology are a desirable and easy target for hackers. Few of these users think that their devices, their personal information or what they do online is worth protecting. Even fewer know how to protect themselves from cyber threats.As a result, every day thousands of such users pay dearly with ruined reputation, destroyed financial stability and sometimes even their own lives.  You don't have to be one of them. You can defend yourself from the most common cyber threats. And you don't have to be a computer scientist or cyber security expert. It's easier than you may think....  Have you been hacked yet? covers all the basics you need to know to protect yourself and your loved ones against the most common cyber security threats to privacy and financial well being: what are the threats a typical user of information technology faces these days, who are your "cyber enemies", their tools and tricks they use to steal your identity or to compromise your devices and what you can do to prevent hackers attacks on your devices or to minimize negative consequences of successful hackingattacks on you and your loved ones. In this book you will learn: How hackers prepare and implement attacks on people like us (page 24). What tools hackers use to implement their attacks (page 50). How our computing devices become infected (page 67). How hackers use our human vulnerabilities to trick us into giving them our sensitive private information (page 60) and what you can do to make these tricks less effective (page 70). How to design an ideal password (page 81) and keep it safe (page 83). How you can protect your valuable information using encryption (page 90). How to secure your PC (page 98), your online browsing (page 129), and your social media accounts (page112). How to maintain your privacy on the internet (page 142).

Artículos relacionados

  • Handbook of Research on Emerging Developments in Data Privacy
    Manish Gupta
    Data collection allows today’s businesses to cater to each customer’s individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks o...
    Disponible

    426,38 €

  • Scrappy Information Security
    Michael Seese
    The Internet, like Elvis, is everywhere. It is in our homes, our places of work, our phones. Unfortunately, cyberspace is teeming with bad people who want to steal our identities, pilfer our corporate secrets, get their grubby little fingers into our online wallets, and -- to add insult to injury -- latch onto our PCs to perpetuate their crimes.Modern corporations do their best...
  • The GnuTLS 3.6.1 Manual
    Nikos Mavrogiannopoulos / Simon Josefsson
    GnuTLS is a portable ANSI C based library which implements the protocols ranging from SSL 3.0 to TLS 1.2, accompanied with the required framework for authentication and public key infrastructure. Important features of the GnuTLS library include: Support for TLS 1.2, TLS 1.1, TLS 1.0 and SSL 3.0 protocols. Support for Datagram TLS 1.0 and 1.2. Support for handling and verifi...
    Disponible

    20,92 €

  • Information Assurance and Security Technologies for Risk Assessment and Threat Management
    Te-Shun Chou
    The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by tho...
    Disponible

    255,99 €

  • Cybercrime
    Denise M. Chatam / Denise MChatam
    Cybercrime: Secure IT or Lose IT looks at the who, what, why, when, and where of Internet crime from the perspective of businesspeople. Information security and audit personnel will find value in the materials provided in this book to establish and maintain a comprehensive information security program and to aid in satisfying regulatory compliance requirements. ...
    Disponible

    14,40 €

  • Have You Been Hacked Yet?
    N. Stakhanova & O. Stakhanov
    Do you or someone in your house:have a computer, an iPad, or a smartphone? browse the internet, use e-mail or have a Facebook, Twitter, LinkedIn or other social account? ordo online banking, or purchase things online? If your answer is "yes" to any of the above questions, than it's not a question of "if", but "when" cybercriminals will try to steal your or your loved ones&#...

Otros libros del autor

  • Have You Been Hacked Yet?
    N. Stakhanova & O. Stakhanov
    Do you or someone in your house:have a computer, an iPad, or a smartphone? browse the internet, use e-mail or have a Facebook, Twitter, LinkedIn or other social account? ordo online banking, or purchase things online? If your answer is "yes" to any of the above questions, than it's not a question of "if", but "when" cybercriminals will try to steal your or your loved ones&#...