Digital defense a cybersecurity primer /

Drs. Pelton and Singh warn of the increasing risks of cybercrime and lay out a series of commonsense precautions to guard against individual security breaches. This guide clearly explains the technology at issue, the points of weakness, and the best ways to proactively monitor and maintain the integ...

Full description

Main Author: Pelton, Joseph N.,
Other Authors: Singh, Indu Bhushan,, SpringerLink (Online service)
Format: eBook
Language: English
Published: Cham : Springer, [2015]
Physical Description: 1 online resource (xx, 209 pages)
Subjects:
LEADER 06139cam a2200961 i 4500
001 925521742
003 OCoLC
005 20240223121953.0
006 m o d
007 cr cnu|||unuuu
008 151020s2015 sz ob 001 0 eng d
015 |a GBB8N2717  |2 bnb 
016 7 |a 019147949  |2 Uk 
019 |a 985057319  |a 1005752634  |a 1011851282  |a 1022044241  |a 1026444138  |a 1048139988  |a 1066628543  |a 1086468586  |a 1110853702  |a 1112566612  |a 1162695407 
020 |a 9783319199535  |q (electronic bk.) 
020 |a 3319199536  |q (electronic bk.) 
020 |z 3319199528  |q (print) 
020 |z 9783319199528  |q (print) 
024 7 |a 10.1007/978-3-319-19953-5  |2 doi 
035 |a (OCoLC)925521742  |z (OCoLC)985057319  |z (OCoLC)1005752634  |z (OCoLC)1011851282  |z (OCoLC)1022044241  |z (OCoLC)1026444138  |z (OCoLC)1048139988  |z (OCoLC)1066628543  |z (OCoLC)1086468586  |z (OCoLC)1110853702  |z (OCoLC)1112566612  |z (OCoLC)1162695407 
037 |a com.springer.onix.9783319199535  |b Springer Nature 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d IDEBK  |d YDXCP  |d CDX  |d OCLCF  |d EBLCP  |d NUI  |d DEBSZ  |d COO  |d GW5XE  |d UIU  |d SNK  |d ANG  |d IDB  |d IAS  |d IAO  |d JBG  |d IAD  |d ICN  |d SOI  |d ILO  |d VT2  |d Z5A  |d OCLCQ  |d ESU  |d IOG  |d NJR  |d UAB  |d U3W  |d MERUC  |d OCLCA  |d REB  |d OCLCQ  |d CEF  |d OCLCQ  |d WYU  |d UKMGB  |d UKAHL  |d OCLCQ  |d DCT  |d ERF  |d OCLCQ  |d AJS  |d OCLCO  |d INARC  |d OCLCQ  |d OCLCO  |d OCLCL  |d OCLCQ 
049 |a COM6 
050 4 |a QA76.9.A25  |b P45 2015eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a PDZ  |2 bicssc 
082 0 4 |a 005.8  |2 23 
100 1 |a Pelton, Joseph N.,  |e author. 
245 1 0 |a Digital defense :  |b a cybersecurity primer /  |c Joseph N. Pelton, Indu B. Singh. 
264 1 |a Cham :  |b Springer,  |c [2015] 
300 |a 1 online resource (xx, 209 pages) 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
347 |a text file  |b PDF  |2 rda. 
504 |a Includes bibliographical references and index. 
588 0 |a Vendor-supplied metadata. 
505 0 |a What is at stake? What should you do? Why should you care? -- Where to go for assistance -- Is anyone looking out for you? Your government? Businesses where you trade? Your neighbor? or Just yourself? -- Ten key things to protect -- Cybersecurity for smart phones, mobile apps, and "the cloud" -- Protecting vital cyber infrastructure -- Who will control the future, black hat hackers or the hacked? -- Ten essential rules for your cyber defense -- Appendix A : Glossary of definitions and acronyms -- Appendix B : Current U.S. priorities on cybersecurity -- Appendix C : The U.S. Comprehensive National Cybersecurity Initiative (CNCI) -- Appendix D : Cybersecurity activities ad policies around the world. 
520 |a Drs. Pelton and Singh warn of the increasing risks of cybercrime and lay out a series of commonsense precautions to guard against individual security breaches. This guide clearly explains the technology at issue, the points of weakness, and the best ways to proactively monitor and maintain the integrity of individual networks. Covering both the most common personal attacks of identity fraud, phishing, malware, and breach of access as well as the larger threats against companies and governmental systems, the authors explain the vulnerabilities of the internet age. As more and more of life's transactions take place online, the average computer user and society at large have a lot to lose. All users can take steps to secure their information. Cybercrime is so subtle and hidden, people can ignore the threat until it is too late. Yet today about every three seconds a person is hit by some form of cyberattack out of the blue. Locking the ℓℓ́cyber-barn doorℓℓ́ after a hacker has struck is way too late. Cybersecurity, cybercrime, and cyberterrorism may seem to be intellectual crimes that don't really touch the average person, but the threat is real. Demystifying them is the most important step, and this accessible explanation covers all the bases. 
650 0 |a Computer security. 
650 0 |a National security. 
650 2 |a Computer Security. 
650 6 |a Sécurité informatique. 
650 7 |a Computer security.  |2 bicssc. 
650 7 |a Communications engineering  |x telecommunications.  |2 bicssc. 
650 7 |a Popular science.  |2 bicssc. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh. 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh. 
650 7 |a Computer security.  |2 fast. 
650 7 |a National security.  |2 fast. 
700 1 |a Singh, Indu Bhushan,  |e author. 
710 2 |a SpringerLink (Online service) 
776 0 8 |i Printed edition:  |z 9783319199528. 
907 |a .b49725725  |b multi  |c -  |d 160208  |e 240320 
998 |a (3)cue  |a cu  |b 240227  |c m  |d z   |e -  |f eng  |g sz   |h 0  |i 2 
948 |a MARCIVE Overnight, in 2024.03 
948 |a MARCIVE Comp, in 2023.01 
948 |a MARCIVE Over, 07/2021 
948 |a MARCIVE Comp, 2019.12 
948 |a MARCIVE Q2, 2018 
948 |a MARCIVE Comp, 2018.05 
948 |a MARCIVE August, 2017 
948 |a MARCIVE extract Aug 5, 2017 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2024.03 
995 |a Loaded with m2btab.elec in 2024.02 
995 |a Loaded with m2btab.ltiac in 2023.01 
995 |a Loaded with m2btab.ltiac in 2021.07 
995 |a Loaded with m2btab.elec in 2021.06 
995 |a Loaded with m2btab.ltiac in 2019.12 
995 |a Loaded with m2btab.ltiac in 2018.08 
995 |a Loaded with m2btab.ltiac in 2018.06 
995 0 0 |a OCLC offline update by CMU and loaded with m2btab.elec in 2018.04 
995 |a Loaded with m2btab.ltiac in 2017.09 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.elec in 2016 
995 |a OCLC offline update by CMU 
999 |e z 
999 |a cue 
989 |d cueme  |e  - -   |f  - -   |g -   |h 0  |i 0  |j 200  |k 240227  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w SpringerLink  |1 .i15043683x  |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-319-19953-5  |3 SpringerLink  |z Click here for access