Description

Book Synopsis


Table of Contents

Introduction 1

Part 1: Getting Started with Cybersecurity 5

Chapter 1: What Exactly Is Cybersecurity? 7

Chapter 2: Getting to Know Common Cyberattacks 23

Chapter 3: The Bad Guys You Must Defend Against 49

Part 2: Improving Your Own Personal Security 69

Chapter 4: Evaluating Your Current Cybersecurity Posture 71

Chapter 5: Enhancing Physical Security 93

Chapter 6: Cybersecurity Considerations When Working from Home 105

Part 3: Protecting Yourself from Yourself 115

Chapter 7: Securing Your Accounts 117

Chapter 8: Passwords 135

Chapter 9: Preventing Social Engineering Attacks 151

Part 4: Cybersecurity for Businesses, Organizations, and Government 173

Chapter 10: Securing Your Small Business 175

Chapter 11: Cybersecurity and Big Businesses 201

Part 5: Handling a Security Incident (This Is a When, Not an If) 217

Chapter 12: Identifying a Security Breach 219

Chapter 13: Recovering from a Security Breach 239

Part 6: Backing Up and Recovery 259

Chapter 14: Backing Up 261

Chapter 15: Resetting Your Device 289

Chapter 16: Restoring from Backups 299

Part 7: Looking toward the Future 321

Chapter 17: Pursuing a Cybersecurity Career 323

Chapter 18: Emerging Technologies Bring New Threats 337

Part 8: The Part of Tens 351

Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353

Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359

Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367

Index 371

ntroduction 1

Part 1: Getting Started with Cybersecurity 5

Chapter 1: What Exactly Is Cybersecurity? 7

Chapter 2: Getting to Know Common Cyberattacks 23

Chapter 3: The Bad Guys You Must Defend Against 49

Part 2: Improving Your Own Personal Security 69

Chapter 4: Evaluating Your Current Cybersecurity Posture 71

Chapter 5: Enhancing Physical Security 93

Chapter 6: Cybersecurity Considerations When Working from Home 105

Part 3: Protecting Yourself from Yourself 115

Chapter 7: Securing Your Accounts 117

Chapter 8: Passwords 135

Chapter 9: Preventing Social Engineering Attacks 151

Part 4: Cybersecurity for Businesses, Organizations, and Government 173

Chapter 10: Securing Your Small Business 175

Chapter 11: Cybersecurity and Big Businesses 201

Part 5: Handling a Security Incident (This Is a When, Not an If) 217

Chapter 12: Identifying a Security Breach 219

Chapter 13: Recovering from a Security Breach 239

Part 6: Backing Up and Recovery 259

Chapter 14: Backing Up 261

Chapter 15: Resetting Your Device 289

Chapter 16: Restoring from Backups 299

Part 7: Looking toward the Future 321

Chapter 17: Pursuing a Cybersecurity Career 323

Chapter 18: Emerging Technologies Bring New Threats 337

Part 8: The Part of Tens 351

Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353

Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359

Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367

Index 371

ntroduction 1

Part 1: Getting Started with Cybersecurity 5

Chapter 1: What Exactly Is Cybersecurity? 7

Chapter 2: Getting to Know Common Cyberattacks 23

Chapter 3: The Bad Guys You Must Defend Against 49

Part 2: Improving Your Own Personal Security 69

Chapter 4: Evaluating Your Current Cybersecurity Posture 71

Chapter 5: Enhancing Physical Security 93

Chapter 6: Cybersecurity Considerations When Working from Home 105

Part 3: Protecting Yourself from Yourself 115

Chapter 7: Securing Your Accounts 117

Chapter 8: Passwords 135

Chapter 9: Preventing Social Engineering Attacks 151

Part 4: Cybersecurity for Businesses, Organizations, and Government 173

Chapter 10: Securing Your Small Business 175

Chapter 11: Cybersecurity and Big Businesses 201

Part 5: Handling a Security Incident (This Is a When, Not an If) 217

Chapter 12: Identifying a Security Breach 219

Chapter 13: Recovering from a Security Breach 239

Part 6: Backing Up and Recovery 259

Chapter 14: Backing Up 261

Chapter 15: Resetting Your Device 289

Chapter 16: Restoring from Backups 299

Part 7: Looking toward the Future 321

Chapter 17: Pursuing a Cybersecurity Career 323

Chapter 18: Emerging Technologies Bring New Threats 337

Part 8: The Part of Tens 351

Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353

Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359

Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367

Index 371

Cybersecurity For Dummies

Product form

£23.74

Includes FREE delivery

RRP £24.99 – you save £1.25 (5%)

Order before 4pm today for delivery by Fri 19 Dec 2025.

A Paperback / softback by Joseph Steinberg

4 in stock


    View other formats and editions of Cybersecurity For Dummies by Joseph Steinberg

    Publisher: John Wiley & Sons Inc
    Publication Date: 10/06/2022
    ISBN13: 9781119867180, 978-1119867180
    ISBN10: 1119867185

    Description

    Book Synopsis


    Table of Contents

    Introduction 1

    Part 1: Getting Started with Cybersecurity 5

    Chapter 1: What Exactly Is Cybersecurity? 7

    Chapter 2: Getting to Know Common Cyberattacks 23

    Chapter 3: The Bad Guys You Must Defend Against 49

    Part 2: Improving Your Own Personal Security 69

    Chapter 4: Evaluating Your Current Cybersecurity Posture 71

    Chapter 5: Enhancing Physical Security 93

    Chapter 6: Cybersecurity Considerations When Working from Home 105

    Part 3: Protecting Yourself from Yourself 115

    Chapter 7: Securing Your Accounts 117

    Chapter 8: Passwords 135

    Chapter 9: Preventing Social Engineering Attacks 151

    Part 4: Cybersecurity for Businesses, Organizations, and Government 173

    Chapter 10: Securing Your Small Business 175

    Chapter 11: Cybersecurity and Big Businesses 201

    Part 5: Handling a Security Incident (This Is a When, Not an If) 217

    Chapter 12: Identifying a Security Breach 219

    Chapter 13: Recovering from a Security Breach 239

    Part 6: Backing Up and Recovery 259

    Chapter 14: Backing Up 261

    Chapter 15: Resetting Your Device 289

    Chapter 16: Restoring from Backups 299

    Part 7: Looking toward the Future 321

    Chapter 17: Pursuing a Cybersecurity Career 323

    Chapter 18: Emerging Technologies Bring New Threats 337

    Part 8: The Part of Tens 351

    Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353

    Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359

    Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367

    Index 371

    ntroduction 1

    Part 1: Getting Started with Cybersecurity 5

    Chapter 1: What Exactly Is Cybersecurity? 7

    Chapter 2: Getting to Know Common Cyberattacks 23

    Chapter 3: The Bad Guys You Must Defend Against 49

    Part 2: Improving Your Own Personal Security 69

    Chapter 4: Evaluating Your Current Cybersecurity Posture 71

    Chapter 5: Enhancing Physical Security 93

    Chapter 6: Cybersecurity Considerations When Working from Home 105

    Part 3: Protecting Yourself from Yourself 115

    Chapter 7: Securing Your Accounts 117

    Chapter 8: Passwords 135

    Chapter 9: Preventing Social Engineering Attacks 151

    Part 4: Cybersecurity for Businesses, Organizations, and Government 173

    Chapter 10: Securing Your Small Business 175

    Chapter 11: Cybersecurity and Big Businesses 201

    Part 5: Handling a Security Incident (This Is a When, Not an If) 217

    Chapter 12: Identifying a Security Breach 219

    Chapter 13: Recovering from a Security Breach 239

    Part 6: Backing Up and Recovery 259

    Chapter 14: Backing Up 261

    Chapter 15: Resetting Your Device 289

    Chapter 16: Restoring from Backups 299

    Part 7: Looking toward the Future 321

    Chapter 17: Pursuing a Cybersecurity Career 323

    Chapter 18: Emerging Technologies Bring New Threats 337

    Part 8: The Part of Tens 351

    Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353

    Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359

    Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367

    Index 371

    ntroduction 1

    Part 1: Getting Started with Cybersecurity 5

    Chapter 1: What Exactly Is Cybersecurity? 7

    Chapter 2: Getting to Know Common Cyberattacks 23

    Chapter 3: The Bad Guys You Must Defend Against 49

    Part 2: Improving Your Own Personal Security 69

    Chapter 4: Evaluating Your Current Cybersecurity Posture 71

    Chapter 5: Enhancing Physical Security 93

    Chapter 6: Cybersecurity Considerations When Working from Home 105

    Part 3: Protecting Yourself from Yourself 115

    Chapter 7: Securing Your Accounts 117

    Chapter 8: Passwords 135

    Chapter 9: Preventing Social Engineering Attacks 151

    Part 4: Cybersecurity for Businesses, Organizations, and Government 173

    Chapter 10: Securing Your Small Business 175

    Chapter 11: Cybersecurity and Big Businesses 201

    Part 5: Handling a Security Incident (This Is a When, Not an If) 217

    Chapter 12: Identifying a Security Breach 219

    Chapter 13: Recovering from a Security Breach 239

    Part 6: Backing Up and Recovery 259

    Chapter 14: Backing Up 261

    Chapter 15: Resetting Your Device 289

    Chapter 16: Restoring from Backups 299

    Part 7: Looking toward the Future 321

    Chapter 17: Pursuing a Cybersecurity Career 323

    Chapter 18: Emerging Technologies Bring New Threats 337

    Part 8: The Part of Tens 351

    Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353

    Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359

    Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367

    Index 371

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account