000 | 04842cam a2200817 i 4500 | ||
---|---|---|---|
001 | on1079056030 | ||
003 | OCoLC | ||
005 | 20240523125541.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 181217s2019 inu ob 001 0 eng d | ||
040 |
_aN$T _beng _erda _epn _cN$T _dTEFOD _dYDX _dDG1 _dOCLCF _dUKMGB _dMERER _dTOH _dOCLCQ _dOCLCO _dOCL _dOCLCQ _dUKAHL _dLOA _dUX1 _dVT2 _dK6U _dSFB _dOCLCQ _dOCLCO _dNZAUC _dOCLCQ _dOCLCO _dOCLCL |
||
015 |
_aGBB907363 _2bnb |
||
015 |
_aGBB917255 _2bnb |
||
016 | 7 |
_a019183556 _2Uk |
|
019 |
_a1078941248 _a1164600864 _a1175639754 |
||
020 |
_a9781119559634 _q(electronic bk.) |
||
020 |
_a1119559634 _q(electronic bk.) |
||
020 |
_a9781119559641 _q(electronic bk.) |
||
020 |
_a1119559642 _q(electronic bk.) |
||
020 |
_a9781119559658 _q(electronic bk.) |
||
020 |
_a1119559650 _q(electronic bk.) |
||
020 | _a1119559618 | ||
020 | _a9781119559610 | ||
020 | _z1119559618 | ||
020 | _z9781119559610 | ||
024 | 3 | _a9781119559610 | |
029 | 1 |
_aAU@ _b000065068558 |
|
029 | 1 |
_aCHNEW _b001039249 |
|
029 | 1 |
_aCHVBK _b559027125 |
|
029 | 1 |
_aUKMGB _b019183556 |
|
035 |
_a(OCoLC)1079056030 _z(OCoLC)1078941248 _z(OCoLC)1164600864 _z(OCoLC)1175639754 |
||
037 |
_aB7E0B21C-320D-4989-9CDB-713A2FA373A0 _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
050 | 4 | _aTK5105.59 | |
072 | 7 |
_aCOM _x032000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8/2 _223 |
049 | _aMAIN | ||
100 | 1 |
_aMcDonough, Bart R., _eauthor. |
|
245 | 1 | 0 |
_aCyber smart : _bfive habits to protect your family, money, and identity from cyber criminals / _cBart R. McDonough. |
264 | 1 |
_aIndianapolis, IN : _bJohn Wiley & Sons, Inc., _c[2019] |
|
264 | 4 | _c�2019 | |
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 | _adata file | ||
504 | _aIncludes bibliographical references and index. | ||
588 | 0 | _aPrint version record. | |
505 | 0 | _aSetting the stage -- Overview of cyber risks -- Attackers -- Attack targets and goals -- Attack methods -- Attack chain -- Attack vectors -- Brilliance in the basics -- Mistakes -- Incident response -- Specific recommendations -- Protecting your identity -- Protecting your children -- Protecting your money -- Protecting your email -- Protecting your files -- Protecting your social media -- Protecting your website access and passwords -- Protecting your computer -- Protecting your mobile devices -- Protecting your home wi-fi -- Protecting your IoT devices -- Protecting your information when traveling. | |
520 |
_aThe rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers. Every new device and online service you use that improves your life also opens new doors for attackers looking to discover your passwords, banking accounts, personal photos, and anything else you want to keep secret. In Cyber Smart, author Bart McDonough uses his extensive cybersecurity experience speaking at conferences for the FBI, major financial institutions, and other clients to answer the most common question he hears: "How can I protect myself at home, on a personal level, away from the office?" McDonough knows cybersecurity and online privacy are daunting to the average person so Cyber Smart simplifies online good hygiene with five simple "Brilliance in the Basics" habits anyone can learn." _c--Publisher's description |
||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 |
_aComputer crimes _xPrevention. |
|
650 | 0 | _aComputer security. | |
650 | 2 | _aComputer Security | |
650 | 6 |
_aR�eseaux d'ordinateurs _xS�ecurit�e _xMesures. |
|
650 | 6 | _aS�ecurit�e informatique. | |
650 | 7 |
_aCOMPUTERS _xInformation Technology. _2bisacsh |
|
650 | 7 |
_aComputer networks _xSecurity measures _2fast |
|
650 | 7 |
_aComputer crimes _xPrevention _2fast |
|
650 | 7 |
_aComputer security _2fast |
|
758 |
_ihas work: _aCyber Smart (Text) _1https://id.oclc.org/worldcat/entity/E39PCXyxhkJtYyWxBjvWHJq6yq _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _aMcDonough, Bart R. _tCyber smart. _dIndianapolis, IN : John Wiley & Sons, Inc., [2019] _z9781119559610 |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119559658 |
938 |
_aAskews and Holts Library Services _bASKH _nAH35216707 |
||
938 |
_aAskews and Holts Library Services _bASKH _nAH35216706 |
||
938 |
_aEBSCOhost _bEBSC _n1983871 |
||
938 |
_aYBP Library Services _bYANK _n15894612 |
||
938 |
_aYBP Library Services _bYANK _n15890419 |
||
994 |
_a92 _bINLUM |
||
999 |
_c12574 _d12574 |