000 | 02836cam a2200361 i 4500 | ||
---|---|---|---|
001 | 2012028121 | ||
003 | DLC | ||
005 | 20250203140445.0 | ||
008 | 120829s2013 flua b 000 0 eng | ||
010 | _a 2012028121 | ||
020 | _a9781439856185 (pbk.) | ||
040 |
_aDLC _beng _cDLC _erda _dDLC _dMiTN |
||
042 | _apcc | ||
049 | _aEY8Z | ||
050 | 0 | 0 |
_aQA76.9.A25 _bJ224 2013 |
082 | 0 | 0 |
_a005.8 _223 |
084 |
_aCOM053000 _aCOM083000 _2bisacsh |
||
100 | 1 | _aJacobson, Douglas. | |
245 | 1 | 0 |
_aComputer security literacy : _bstaying safe in a digital world / _cDouglas Jacobson and Joseph Idziorek. |
264 | 1 |
_aBoca Raton : _bCRC Press / Taylor & Francis Group, _c[2013] |
|
300 |
_axxiii, 344 pages : _billustrations ; _c24 cm |
||
336 |
_atext _2rdacontent |
||
337 |
_aunmediated _2rdamedia |
||
338 |
_avolume _2rdacarrier |
||
520 |
_a"Preface Approach Traditional computer security books educate readers about a multitude of topics, ranging from secure programming practices, protocols, and algorithm designs to cryptography and ethics. These books typically focus on the implementation or theory of security controls and mechanisms at the application, operating system, network, and physical layers. Breaking this traditional model, "Computer Security Literacy: Staying Safe in a Digital World" instead seeks to educate the reader at the user layer and focuses on practical topics that one is likely to encounter on a regular basis. It has long been recognized that the user is in fact the weakest link in the security chain. So why not effect change by providing practical and relevant education for the normal user of information technology? As it turns out, we, the user, often have the greatest impact in the security of our computer and information as a result of the actions that we do or do not perform. This text provides practical security education to give the reader context to make sound security decisions. The outcomes of this book are as follows. The reader will be able to: - Define computer security terms and mechanisms - Describe fundamental security concepts - State computer security best practices - Describe the strengths, weaknesses, and limitations of security mechanisms and concepts - Give examples of common security threats, threat sources, and threat motivations - Explain their role in protecting their own computing environment and personal and confidential information - Discuss current event topics and read security articles in the popular press - Assess computing actions in the context of securit"-- _cProvided by publisher. |
||
504 | _aIncludes bibliographical references. | ||
650 | 0 |
_aComputer security. _93672 |
|
700 | 1 | _aIdziorek, Joseph. | |
948 | _au362656 | ||
949 |
_aQA76.9 .A25 J224 2013 _wLC _c1 _hEY8Z _i33039001269553 |
||
596 | _a1 | ||
903 | _a24259 | ||
999 |
_c24259 _d24259 |