Logo

Good Digital Hygiene: A guide to staying secure in cyberspace

Small book cover: Good Digital Hygiene: A guide to staying secure in cyberspace

Good Digital Hygiene: A guide to staying secure in cyberspace
by

Publisher: Bookboon
ISBN-13: 9788740305777
Number of pages: 86

Description:
The explosive growth in the adoption of electronic devices by the general population (computers in various forms, smartphones and tablets) is creating and environment where some measures of digital hygiene (such as maintaining strong passwords, carrying out backups, not becoming a victim to phishing, etc.) are needed to protect the devices and the data they contain as well as their owners. This book presents 39 such measures.

Home page url

Download or read it online for free here:
Download link
(14MB, PDF)

Similar books

Book cover: Cryptography and Data SecurityCryptography and Data Security
by - Addison-Wesley
The book introduces the mathematical principles of data security and shows how these principles apply to operating systems, database systems, and computer networks. It is for students and professionals seeking an introduction to these principles.
(13410 views)
Book cover: The Security Development LifecycleThe Security Development Lifecycle
by - Microsoft Press
This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs -- the Security Development Lifecycle (SDL). Security experts guide you through each stage of the SDL -- from design to testing and post-release.
(3173 views)
Book cover: Safeguarding Your TechnologySafeguarding Your Technology
by - NCES
This guide has been developed for educational administrators at the building, campus, district, system, and state levels. It will help them better understand how to effectively secure their information, software, computer and networking equipment.
(6414 views)
Book cover: Cryptography and Security in ComputingCryptography and Security in Computing
by - InTech
The purpose of this book is to present some of the security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defense mechanisms.
(15415 views)