Search results for ""Joseph Steinberg" "Cybersecurity For Dummies""
John Wiley & Sons Inc Cybersecurity For Dummies
Book SynopsisTable of ContentsIntroduction 1 Part 1: Getting Started with Cybersecurity 5 Chapter 1: What Exactly Is Cybersecurity? 7 Chapter 2: Getting to Know Common Cyberattacks 23 Chapter 3: The Bad Guys You Must Defend Against 49 Part 2: Improving Your Own Personal Security 69 Chapter 4: Evaluating Your Current Cybersecurity Posture 71 Chapter 5: Enhancing Physical Security 93 Chapter 6: Cybersecurity Considerations When Working from Home 105 Part 3: Protecting Yourself from Yourself 115 Chapter 7: Securing Your Accounts 117 Chapter 8: Passwords 135 Chapter 9: Preventing Social Engineering Attacks 151 Part 4: Cybersecurity for Businesses, Organizations, and Government 173 Chapter 10: Securing Your Small Business 175 Chapter 11: Cybersecurity and Big Businesses 201 Part 5: Handling a Security Incident (This Is a When, Not an If) 217 Chapter 12: Identifying a Security Breach 219 Chapter 13: Recovering from a Security Breach 239 Part 6: Backing Up and Recovery 259 Chapter 14: Backing Up 261 Chapter 15: Resetting Your Device 289 Chapter 16: Restoring from Backups 299 Part 7: Looking toward the Future 321 Chapter 17: Pursuing a Cybersecurity Career 323 Chapter 18: Emerging Technologies Bring New Threats 337 Part 8: The Part of Tens 351 Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353 Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359 Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367 Index 371 ntroduction 1 Part 1: Getting Started with Cybersecurity 5 Chapter 1: What Exactly Is Cybersecurity? 7 Chapter 2: Getting to Know Common Cyberattacks 23 Chapter 3: The Bad Guys You Must Defend Against 49 Part 2: Improving Your Own Personal Security 69 Chapter 4: Evaluating Your Current Cybersecurity Posture 71 Chapter 5: Enhancing Physical Security 93 Chapter 6: Cybersecurity Considerations When Working from Home 105 Part 3: Protecting Yourself from Yourself 115 Chapter 7: Securing Your Accounts 117 Chapter 8: Passwords 135 Chapter 9: Preventing Social Engineering Attacks 151 Part 4: Cybersecurity for Businesses, Organizations, and Government 173 Chapter 10: Securing Your Small Business 175 Chapter 11: Cybersecurity and Big Businesses 201 Part 5: Handling a Security Incident (This Is a When, Not an If) 217 Chapter 12: Identifying a Security Breach 219 Chapter 13: Recovering from a Security Breach 239 Part 6: Backing Up and Recovery 259 Chapter 14: Backing Up 261 Chapter 15: Resetting Your Device 289 Chapter 16: Restoring from Backups 299 Part 7: Looking toward the Future 321 Chapter 17: Pursuing a Cybersecurity Career 323 Chapter 18: Emerging Technologies Bring New Threats 337 Part 8: The Part of Tens 351 Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353 Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359 Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367 Index 371 ntroduction 1 Part 1: Getting Started with Cybersecurity 5 Chapter 1: What Exactly Is Cybersecurity? 7 Chapter 2: Getting to Know Common Cyberattacks 23 Chapter 3: The Bad Guys You Must Defend Against 49 Part 2: Improving Your Own Personal Security 69 Chapter 4: Evaluating Your Current Cybersecurity Posture 71 Chapter 5: Enhancing Physical Security 93 Chapter 6: Cybersecurity Considerations When Working from Home 105 Part 3: Protecting Yourself from Yourself 115 Chapter 7: Securing Your Accounts 117 Chapter 8: Passwords 135 Chapter 9: Preventing Social Engineering Attacks 151 Part 4: Cybersecurity for Businesses, Organizations, and Government 173 Chapter 10: Securing Your Small Business 175 Chapter 11: Cybersecurity and Big Businesses 201 Part 5: Handling a Security Incident (This Is a When, Not an If) 217 Chapter 12: Identifying a Security Breach 219 Chapter 13: Recovering from a Security Breach 239 Part 6: Backing Up and Recovery 259 Chapter 14: Backing Up 261 Chapter 15: Resetting Your Device 289 Chapter 16: Restoring from Backups 299 Part 7: Looking toward the Future 321 Chapter 17: Pursuing a Cybersecurity Career 323 Chapter 18: Emerging Technologies Bring New Threats 337 Part 8: The Part of Tens 351 Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353 Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359 Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367 Index 371
£23.74