Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

Buy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and phishing attacks and emerging threats that exploit cloud‐based storage and mobile apps.

It’s a wonderful thing to be able to use any of your cloud-synced assortment of desktop, portable, mobile, and wearable computing devices to work from home, shop at work, pay in a store, do your banking from a coffee shop, submit your tax returns from the airport, or post your selfies from the Oscars. But with this new world of connectivity and convenience comes a host of new perils for the lazy, the greedy, the unwary, and the ignorant. The 10 Don’ts can’t do much for the lazy and the greedy, but they can save the unwary and the ignorant a world of trouble.

10 Don’ts employs personal anecdotes and major news stories to illustrate what can—and all too often does—happen when users are careless with their devices and data. Each chapter describes a common type of blunder (one of the 10 Don’ts), reveals how it opens a particular port of entry to predatory incursions and privacy invasions, and details all the unpleasant consequences that may come from doing a Don’t. The chapter then shows you how to diagnose and fix the resulting problems, how to undo or mitigate their costs, and how to protect against repetitions with specific software defenses and behavioral changes.

Through ten vignettes told in accessible language and illustrated with helpful screenshots, 10 Don’ts teaches non-technical readers ten key lessons for protecting your digital security and privacy with the same care you reflexively give to your physical security and privacy, so that you don’t get phished, give up your password, get lost in the cloud, look for a free lunch, do secure things from insecure places, let the snoops in, be careless when going mobile, use dinosaurs, or forget the physical—in short, so that you don’t trust anyone over…anything.

Non-techie readers are not unsophisticated readers. They spend much of their waking lives on their devices and are bombarded with and alarmed by news stories of unimaginably huge data breaches, unimaginably sophisticated "advanced persistent threat" activities by criminal organizations and hostile nation-states, and unimaginably intrusive clandestine mass electronic surveillance and data mining sweeps by corporations, data brokers, and the various intelligence and law enforcement arms of our own governments. The authors lift the veil on these shadowy realms, show how the little guy is affected, and what individuals can do to shield themselves from big predators and snoops.

What you’ll learn

After reading 10 Don’ts, you will understand how to:

  • detect and report phishing scams
  • choose better passwords and how to manage and safeguard all of them
  • use cloud‐based storage services more safely
  • shield your data from the prying eyes of government agencies, data brokers, corporations, and criminals
  • steer through the risks of public wireless network, shared computers, and obsolete devices
  • select and configure apps for your mobile devices without unknowingly compromising your privacy and security
  • lock, safeguard, and erase your physical devices

Who this book is for

The primary target audience for 10 Don’ts is just about everybody—namely, non-techie individuals who routinely use computers, smartphones, and tablets in their daily lives but who are nagged by persistent worry that they are exposing themselves to personal insecurity, intrusive surveillance, and criminal violation. The secondary readerships for this book include employees of small businesses lacking dedicated IT specialists, whose owners want to give their workers a short and entertaining book to reduce the risk of business loss from unsafe practices; households with multigenerational users, ranging from incautious teenagers to gullible grandparents; and private and public professionals who curate third-party personal data and are liable to litigation or discipline if data is stolen or otherwise compromised.

Table of Contents

Chapter 1. Don’t Get Phished

Chapter 2. Don’t Give Up Your Password

Chapter 3. Don’t Get Lost in the Cloud

Chapter 4. Don’t Look for a Free Lunch

Chapter 5. Don’t Do Secure Things from Insecure Places

Chapter 6. Don’t Let the Snoops In

Chapter 7. Don’t Be Careless When Going Mobile

Chapter 8. Don’t Use Dinosaurs

Chapter 9. Don’t Trust Anyone Over…Anything

Chapter 10. Don’t Forget the Physical

 

(HTML tags aren't allowed.)

The Elements of C++ Style
The Elements of C++ Style
As commercial developers of software components, we always
strive to have good, consistent style throughout our
code. Since source code is usually included in our final products,
our users often study our code to learn not just how the
components work, but also how to write good software.

This fact ultimately led to
...
Zoho For Dummies
Zoho For Dummies

Zoho — the free suite of online productivity applications — offers a fantastic set of resources for anyone with Internet access. You can use a state-of-the-art word processor, spreadsheet, database system, or any of many other applications that Zoho offers. Those applications are as powerful as any you’ll find that you install...

Learn Excel 97 Through Excel 2007 from Mr. Excel: 377 Excel Mysteries Solved!
Learn Excel 97 Through Excel 2007 from Mr. Excel: 377 Excel Mysteries Solved!
Updating the previous edition's tips to make them compatible with Excel 2007, and featuring new tips that are only available in Excel 2007, this new edition of Mr. Excel's popular software guide even incorporates suggestions sent in by readers. Each featured topic has a problem statement and description, followed by a broad...

Silverlight 3 Programmer's Reference (Wrox Programmer to Programmer)
Silverlight 3 Programmer's Reference (Wrox Programmer to Programmer)

This valuable reference—in full color—explains the major new release of Silverlight 3 which is dramatically improved over previous versions and makes the development of powerful Rich Interactive Applications (RIAs) achievable for everyone. Packed with examples and written by a highly-seasoned team of developers and designers, this...

Wi-Fi for the Enterprise : Maximizing 802.11 For Business
Wi-Fi for the Enterprise : Maximizing 802.11 For Business
PUT WiFi TO WORK

With his potent gift for clearly explaining technology, networking guru/author Nathan J. Muller presents a powerful set of tools for making the right decisions, the best moves, and extracting maximum benefits from WiFi in the workplace. In WiFi for the Enterprise, he shares his expertise on equipment,...

Very Nice Ways to Say Very Bad Things: An Unusual Book of Euphemisms
Very Nice Ways to Say Very Bad Things: An Unusual Book of Euphemisms

At a loss for words, hockey puck? You can always quote Shakespeare...

Or delve into this entertaining compendium of insults and verbal abuse, all couched in language of the most uplifting nature. Filled with common and not-so-common zingers that will both shock you and make you laugh your @*#%! off.

Includes:

...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy