Logo

Good Digital Hygiene: A guide to staying secure in cyberspace

Small book cover: Good Digital Hygiene: A guide to staying secure in cyberspace

Good Digital Hygiene: A guide to staying secure in cyberspace
by

Publisher: Bookboon
ISBN-13: 9788740305777
Number of pages: 86

Description:
The explosive growth in the adoption of electronic devices by the general population (computers in various forms, smartphones and tablets) is creating and environment where some measures of digital hygiene (such as maintaining strong passwords, carrying out backups, not becoming a victim to phishing, etc.) are needed to protect the devices and the data they contain as well as their owners. This book presents 39 such measures.

Home page url

Download or read it online for free here:
Download link
(14MB, PDF)

Similar books

Book cover: An Introduction to Computer Security: The NIST HandbookAn Introduction to Computer Security: The NIST Handbook
by
The book provides info on securing hardware and software resources of sensitive systems, explains important concepts and interrelationships of security controls. It illustrates the major techniques for each control, and related considerations.
(14541 views)
Book cover: What If Crime Were Impossible?What If Crime Were Impossible?
by - Univ. of Texas San Antonio
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
(6350 views)
Book cover: Cryptography and Data SecurityCryptography and Data Security
by - Addison-Wesley
The book introduces the mathematical principles of data security and shows how these principles apply to operating systems, database systems, and computer networks. It is for students and professionals seeking an introduction to these principles.
(12518 views)
Book cover: Cyber Infrastructure ProtectionCyber Infrastructure Protection
by - Strategic Studies Institute
This book provides an integrated view of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development and an analysis of technology challenges that impede cyber infrastructure protection.
(7223 views)