Good Digital Hygiene: A guide to staying secure in cyberspace
by Ed Gelbstein
Publisher: Bookboon 2013
ISBN-13: 9788740305777
Number of pages: 86
Description:
The explosive growth in the adoption of electronic devices by the general population (computers in various forms, smartphones and tablets) is creating and environment where some measures of digital hygiene (such as maintaining strong passwords, carrying out backups, not becoming a victim to phishing, etc.) are needed to protect the devices and the data they contain as well as their owners. This book presents 39 such measures.
Download or read it online for free here:
Download link
(14MB, PDF)
Similar books
The Protection of Information in Computer Systems
by J.H. Saltzer, M.D. Schroeder - MIT
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures that are necessary to support information protection.
(10411 views)
by J.H. Saltzer, M.D. Schroeder - MIT
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures that are necessary to support information protection.
(10411 views)
Security Engineering: A Guide to Building Dependable Distributed Systems
by Ross J. Anderson, Ross Anderson - Wiley
The author lays the groundwork on how to build a secure and dependable system. Every security aspect is discussed: passwords, access control, attacks, physical security and policy, information warfare, privacy protection, and more.
(18588 views)
by Ross J. Anderson, Ross Anderson - Wiley
The author lays the groundwork on how to build a secure and dependable system. Every security aspect is discussed: passwords, access control, attacks, physical security and policy, information warfare, privacy protection, and more.
(18588 views)
The Security Development Lifecycle
by Michael Howard, Steve Lipner - Microsoft Press
This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs -- the Security Development Lifecycle (SDL). Security experts guide you through each stage of the SDL -- from design to testing and post-release.
(7075 views)
by Michael Howard, Steve Lipner - Microsoft Press
This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs -- the Security Development Lifecycle (SDL). Security experts guide you through each stage of the SDL -- from design to testing and post-release.
(7075 views)
The Developer Highway Code
by Paul Maher, Alex Mackman - Microsoft Press
This handbook summarises the principal security activities which should be a part of software development processes. It includes identifying security objectives, threat modelling, security design guidelines, security architecture reviews, and more.
(19168 views)
by Paul Maher, Alex Mackman - Microsoft Press
This handbook summarises the principal security activities which should be a part of software development processes. It includes identifying security objectives, threat modelling, security design guidelines, security architecture reviews, and more.
(19168 views)