Logo

Good Digital Hygiene: A guide to staying secure in cyberspace

Small book cover: Good Digital Hygiene: A guide to staying secure in cyberspace

Good Digital Hygiene: A guide to staying secure in cyberspace
by

Publisher: Bookboon
ISBN-13: 9788740305777
Number of pages: 86

Description:
The explosive growth in the adoption of electronic devices by the general population (computers in various forms, smartphones and tablets) is creating and environment where some measures of digital hygiene (such as maintaining strong passwords, carrying out backups, not becoming a victim to phishing, etc.) are needed to protect the devices and the data they contain as well as their owners. This book presents 39 such measures.

Home page url

Download or read it online for free here:
Download link
(14MB, PDF)

Similar books

Book cover: Cryptography and Data SecurityCryptography and Data Security
by - Addison-Wesley
The book introduces the mathematical principles of data security and shows how these principles apply to operating systems, database systems, and computer networks. It is for students and professionals seeking an introduction to these principles.
(10182 views)
Book cover: Security Enhanced Applications for Information SystemsSecurity Enhanced Applications for Information Systems
by - InTech
Designing and implementing security enhanced systems is of vital importance. This book aims to present a number of innovative security enhanced applications. It involves cases based on the standalone, network and Cloud environments.
(5027 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(11123 views)
Book cover: The Developer Highway CodeThe Developer Highway Code
by - Microsoft Press
This handbook summarises the principal security activities which should be a part of software development processes. It includes identifying security objectives, threat modelling, security design guidelines, security architecture reviews, and more.
(13680 views)