Scientific Library of Tomsk State University

   E-catalog        

Normal view MARC view

10 Don’ts on Your Digital Devices (Record no. 399192)

MARC details
000 -Маркер записи
Контрольное поле постоянной длины 04427nam a22004215i 4500
001 - Контрольный номер
Контрольное поле vtls000541349
005 - Дата корректировки
Контрольное поле 20210922082048.0
007 - Кодируемые данные (физ. описан.)
Контрольное поле постоянной длины cr nn 008mamaa
008 - Кодируемые данные
Контрольное поле постоянной длины 160915s2014 xxu| s |||| 0|eng d
020 ## - Индекс ISBN
ISBN 9781484203675
-- 978-1-4842-0367-5
024 7# - Прочие стандартные номера
Стандартный номер 10.1007/978-1-4842-0367-5
Источник номера doi
035 ## - Системный контрольный номер
Системный контрольный номер to000541349
040 ## - Источник каталогиз.
Служба первич. каталог. Springer
Служба, преобразующая запись Springer
Организация, изменившая запись RU-ToGU
050 #4 - Расстановочный код библ. Конгресса
Классификационный индекс QA76.9.A25
072 #7 - Код предметной/темат. категории
Код предметной/темат. категории URY
Источник кода bicssc
072 #7 - Код предметной/темат. категории
Код предметной/темат. категории COM053000
Источник кода bisacsh
082 04 - Индекс Дьюи
Индекс Дьюи 005.82
Номер издания 23
100 1# - Автор
Автор Bachrach, Daniel G.
Роль лиц author.
9 (RLIN) 446664
245 10 - Заглавие
Заглавие 10 Don’ts on Your Digital Devices
Физический носитель electronic resource
Продолж. заглавия The Non-Techie’s Survival Guide to Cyber Security and Privacy /
Ответственность by Daniel G. Bachrach, Eric J. Rzeszut.
260 ## - Выходные данные
Место издания Berkeley, CA :
Издательство Apress :
-- Imprint: Apress,
Дата издания 2014.
300 ## - Физическое описание
Объем XX, 180 p. 30 illus.
Иллюстрации/тип воспроизводства online resource.
336 ## - Тип содержимого
Тип содержимого text
Content type code txt
Source rdacontent
337 ## - Средство доступа
Средство доступа computer
Media type code c
Source rdamedia
338 ## - Тип носителя
Тип носителя online resource
Carrier type code cr
Source rdacarrier
520 ## - Аннотация
Аннотация In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and phishing attacks and emerging threats that exploit cloud‐based storage and mobile apps. It’s a wonderful thing to be able to use any of your cloud-synced assortment of desktop, portable, mobile, and wearable computing devices to work from home, shop at work, pay in a store, do your banking from a coffee shop, submit your tax returns from the airport, or post your selfies from the Oscars. But with this new world of connectivity and convenience comes a host of new perils for the lazy, the greedy, the unwary, and the ignorant. The 10 Don’ts can’t do much for the lazy and the greedy, but they can save the unwary and the ignorant a world of trouble. 10 Don’ts employs personal anecdotes and major news stories to illustrate what can—and all too often does—happen when users are careless with their devices and data. Each chapter describes a common type of blunder (one of the 10 Don’ts), reveals how it opens a particular port of entry to predatory incursions and privacy invasions, and details all the unpleasant consequences that may come from doing a Don’t. The chapter then shows you how to diagnose and fix the resulting problems, how to undo or mitigate their costs, and how to protect against repetitions with specific software defenses and behavioral changes. Through ten vignettes told in accessible language and illustrated with helpful screenshots, 10 Don’ts teaches non-technical readers ten key lessons for protecting your digital security and privacy with the same care you reflexively give to your physical security and privacy, so that you don’t get phished, give up your password, get lost in the cloud, look for a free lunch, do secure things from insecure places, let the snoops in, be careless when going mobile, use dinosaurs, or forget the physical—in short, so that you don’t trust anyone over…anything. Non-techie readers are not unsophisticated readers. They spend much of their waking lives on their devices and are bombarded with and alarmed by news stories of unimaginably huge data breaches, unimaginably sophisticated "advanced persistent threat" activities by criminal organizations and hostile nation-states, and unimaginably intrusive clandestine mass electronic surveillance and data mining sweeps by corporations, data brokers, and the various intelligence and law enforcement arms of our own governments. The authors lift the veil on these shadowy realms, show how the little guy is affected, and what individuals can do to shield themselves from big predators and snoops.
650 #0 - Тематические рубрики
Основная рубрика Computer Science.
9 (RLIN) 155490
650 #0 - Тематические рубрики
Основная рубрика Data encryption (Computer science).
9 (RLIN) 566260
650 14 - Тематические рубрики
Основная рубрика Computer Science.
9 (RLIN) 155490
650 24 - Тематические рубрики
Основная рубрика Data Encryption.
9 (RLIN) 566261
700 1# - Другие авторы
Другие авторы Rzeszut, Eric J.
Роль лиц author.
9 (RLIN) 446665
710 2# - Другие организации
Организация/юрисдикция SpringerLink (Online service)
9 (RLIN) 143950
773 0# - Источник информации
Название источника Springer eBooks
856 40 - Электронный адрес документа
URL <a href="http://dx.doi.org/10.1007/978-1-4842-0367-5">http://dx.doi.org/10.1007/978-1-4842-0367-5</a>
912 ## - Coursera for Campus: онлайн курсы для ТГУ
Coursera for Campus: онлайн курсы для ТГУ ZDB-2-CWD
999 ## - Системные контрольные номера (Koha)
biblionumber (Koha) 399192

No items available.