Now Australia's Biggest Toy Shop

We won't be beaten by anyone. Guaranteed

Computer Security Literacy
By

Rating

Product Description
Product Details

Table of Contents

What Is Information Security?
Introduction
How Much of Our Daily Lives Relies on Computers?
Security Truisms
Basic Security Terminology
Cyber Ethics
The Perception of Security
Threat Model
Security Is a Multidisciplinary Topic

Introduction to Computers and the Internet
Introduction
Computers
Operation of a Computer
Overview of the Internet
Computers and the Internet
Security Role-Playing Characters

Passwords under Attack
Introduction
Authentication Process
Password Threats
Strong Passwords
Password Management: Let's Be Practical

Email Security
Introduction
Email Systems
Email Security and Privacy

Malware: The Dark Side of Software
Introduction
What Is Malware?
How Do I Get Malware?
What Does Malware Do?

Malware: Defense in Depth
Introduction
Data Backup
Firewalls
Software Patches
Antivirus Software
User Education

Securely Surfing the World Wide Web
Introduction
Web Browser
"HTTP Secure"
Web Browser History

Online Shopping
Introduction
Consumer Decisions
Spyware and Key-Loggers
Wireless Sniffing
Scams and Phishing Websites
Misuse and Exposure of Information

Wireless Internet Security
Introduction
How Wireless Networks Work
Wireless Security Threats
Public Wi-Fi Security
Wireless Network Administration

Social Networking
Introduction
Choose Your Friends Wisely
Information Sharing
Malware and Phishing

Social Engineering: Phishing for Suckers
Introduction
Social Engineering: Malware Distribution
Phishing
Detecting a Phishing URL
Application of Knowledge

Staying Safe Online: The Human Threat
Introduction
The Differences between Cyberspace and the Physical World
Consider the Context: Watch What You Say and How It Is Communicated
What You Do on the Internet Lasts Forever
Nothing Is Private, Now or in the Future
Can You Really Tell Who You Are Talking with?
Cameras and Photo Sharing
I Am a Good Person, That Would Never Happen to Me
Is There Anything I Can Do to Make the Internet a Safer Place for My Child?

Case Studies
Introduction
Unable to Remove Malware: Help!
Securely Handling Suspicious Email Attachments
Recovering from a Phishing Attack
Email Account Hacked? Now What?
Smart Phones and Malware
Hey! You! Get off My Wireless Network
Bad Breakup? Sever Your Digital Ties
"Display Images Below"? The Meaning behind the Question
Phishing Email Forensics
It's on the Internet, So It Must Be True
Buying and Selling Online

Moving Forward with Security and Book Summary
Introduction
After the Completion of the Book
Defense-in-Depth Tasks
Chapter Summaries

Glossary

Appendix A: Reading List
Appendix B: Basics of Cryptography
Appendix C: Web Surfing Security Technologies

A Summary and Bibliography appear at the end of each chapter.

Reviews

"... a practical, application-oriented introduction to security education and literacy. While the information is technical enough to provide value to information systems professionals, the organization around specific topics makes it accessible to non-technical users looking for information on specific issues. ... the book would be appropriate for an upper-division introductory course on information security ... a good book for use in educational training programs developed by corporate information security managers. Technical information security professionals could also benefit from reading the book. ... the material is well-written and effectively organized."
-W.T. Neumann, Computing Reviews, March 2013

"User error was manifest last week when it was detailed that the New York Times was penetrated over the course of four months by Chinese hackers who infiltrated its network and obtained passwords for a significant amount of the Times reporters and employees. Attempting to alleviate such user error issues, Computer Security Literacy: Staying Safe in a Digital World is a helpful security awareness book. ... The book provides information about essential security topics in an easy-to-read manner. ... a worthwhile guide for an organization to have in their information security awareness program. It provides the reader with an understanding and appreciation for the magnitude of computer security. Had the New York Times employees been aware of the risks and taken actions as written in Computer Security Literacy, odds are that the effects would have been much less, and they wouldn't have been a cover story in their own periodical."
-Ben Rothke, RSA Conference.com, February 2013

"... a good primer for laypersons who use computers, giving this audience a broad understanding of important points. ... Recommended"
-S.A. Patton, Indiana State University in CHOICE Magazine, June 2013

Ask a Question About this Product More...
Write your question below:
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling Computer Security Literacy: Staying Safe in a Digital World on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond.com, Inc.
Back to top