Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies

Buy

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself?step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know. Computers and the Internet have revolutionized the modern world, but if you're like most people, you have no clue how these things work and don't know the real threats.

Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you'd go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it's about armoring yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data?just like wearing a seat belt, installing smoke alarms, and putting on sunscreen.

Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. The book contains more than 150 tips to make you and your family safer. It includes:

  • Added steps for Windows 10 (Spring 2018) and Mac OS X High Sierra
  • Expanded coverage on mobile device safety
  • Expanded coverage on safety for kids online
  • More than 150 tips with complete step-by-step instructions and pictures

What You’ll Learn

  • Solve your password problems once and for all
  • Browse the web safely and with confidence
  • Block online tracking and dangerous ads
  • Choose the right antivirus software for you
  • Send files and messages securely
  • Set up secure home networking
  • Conduct secure shopping and banking online
  • Lock down social media accounts
  • Create automated backups of all your devices
  • Manage your home computers
  • Use your smartphone and tablet safely
  • Safeguard your kids online
  • And more!

Who This Book Is For

Those who use computers and mobile devices, but don’t really know (or frankly care) how they work. This book is for people who just want to know what they need to do to protect themselves?step by step, without judgment, and with as little jargon as possible.

(HTML tags aren't allowed.)

Java and the Java Virtual Machine: Definition, Verification, Validation
Java and the Java Virtual Machine: Definition, Verification, Validation
This book provides a high-level description, together with a mathematical and an experimental analysis, of Java and of the Java Virtual Machine (JVM), including a standard compiler of Java programs to JVM code and the security critical bytecode verifier component of the JVM. The description is structured into language layers and machine components....
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

Hardening Windows (Expert's Voice)
Hardening Windows (Expert's Voice)

System administrators know the Internet is a hostile environment. They can't tell when a hacker will attempt to gain access to the SQL server, but they can bet that there will be an attempt soon. Because the operating system is vital to a computer's functioning, and because it's the only layer between the machine's available resources and...


Microsoft Access 2013 Inside Out
Microsoft Access 2013 Inside Out

Conquer Microsoft Access 2013—from the inside out!

You’re beyond the basics, so dive right into Access 2013—and use your skills to create sophisticated database apps! This supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds. It’s all...

JBuilder 8.0 JFC and SWING Programming
JBuilder 8.0 JFC and SWING Programming
Sun Microsystems’ Java™ programming language has quickly become one of the most popular programming languages in use today. Its platform independence is only one reason for this success. Other reasons include its powerful object-oriented approach to programming and its built-in memory management. The fact that it is freely available...
Digital Logic Design, Fourth Edition
Digital Logic Design, Fourth Edition
Brian Holdsworth's Digital Logic Design is a well established undergraduate text on digital systems - offering full coverage of the field for first and second year modules and HND units. It has also proved popular in industry as a reference text.

Clive Woods has fully revised the text to cover all the latest developments in the field
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy