Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy
Autor Philip Alexanderen Limba Engleză Hardback – 29 apr 2009 – vârsta până la 17 ani
Preț: 327.33 lei
Preț vechi: 509.48 lei
-36% Nou
Puncte Express: 491
Preț estimativ în valută:
62.65€ • 66.09$ • 52.21£
62.65€ • 66.09$ • 52.21£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780313360077
ISBN-10: 0313360073
Pagini: 176
Dimensiuni: 156 x 235 x 23 mm
Greutate: 0.41 kg
Editura: Bloomsbury Publishing
Colecția Praeger
Locul publicării:New York, United States
ISBN-10: 0313360073
Pagini: 176
Dimensiuni: 156 x 235 x 23 mm
Greutate: 0.41 kg
Editura: Bloomsbury Publishing
Colecția Praeger
Locul publicării:New York, United States
Notă biografică
Philip Alexander is the Director of Security Operations for a fraud-management company. Alexander holds technical as well as security certifications (CISSP, ISSMP, MCSE, MCT) and has been working in the computer field since the 1980s in both the public and private sectors. He is the author Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers (Praeger Security International, 2007).
Cuprins
PrefaceAcknowledgments1. Job #1: Secure Your Network2. Solve Problems While Neutralizing Nosy Tech Support3. Know Where Personal and Customer Data Goes4. Gain Remote Access Securely5. Keep Hackers and Snoops Out of Your Wireless World6. Laugh Off Scammers7. Employ Helpful Software and Safety Tools8. Protect Your Cell Phones and PDAs9. Avoid Theft and Loss of Hardware10. Combat ID Theft11. Protecting ChildrenAppendix A: Online Back-up ServicesAppendix B: Services to Help Keep Children Safer OnlineAppendix C: Tips and TricksGlossary
Recenzii
Alexander, the director of security operations for a fraud management company, has written this guide to computer network security for small businesses and individuals who need to protect electronic assets and maintain privacy. The author uses layman's terms to discuss effective strategies for securing networks, managing personal and customer data, gaining remote access securely, avoiding ID theft, protecting cell phones and PDAs and discouraging scammers and hackers. Additional tips are provided choosing the right protection software, increasing computer productivity and solving basic computer problems.