Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy

Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy
Author :
Publisher : Bloomsbury Publishing USA
Total Pages : 172
Release :
ISBN-10 : 9780313360084
ISBN-13 : 0313360081
Rating : 4/5 (081 Downloads)

Book Synopsis Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy by : Philip Alexander

Download or read book Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy written by Philip Alexander and published by Bloomsbury Publishing USA. This book was released on 2009-04-30 with total page 172 pages. Available in PDF, EPUB and Kindle. Book excerpt: In the news on a daily basis are reports of lost or stolen computer data, hacker successes, identity thefts, virus and spyware problems, and network incursions of various kinds. Many people, especially nonprofessional administrators of home or small business networks, feel helpless. In this book, technical security expert Philip Alexander explains in layman's terms how to keep networks and individual computers safe from the bad guys. In presenting solutions to these problems and many others, the book is a lifeline to those who know their computer systems are vulnerable to smart thieves and hackers—not to mention tech-savvy kids or employees who are swapping music files, stealing software, or otherwise making a mockery of the word security. In his job protecting data and combating financial fraud, Philip Alexander knows well which power tools are required to keep hackers and thieves at bay. With his gift for putting technical solutions in everyday language, Alexander helps readers with home and/or small business networks protect their data, their identities, and their privacy using the latest techniques. In addition, readers will learn how to protect PDAs and smartphones, how to make hardware thefts more unlikely, how to sniff out scammers and the motives of offshore tech support personnel who ask too many questions, and how to keep personal information safer when shopping over the Internet or telephone.


Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy Related Books

Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy
Language: en
Pages: 172
Authors: Philip Alexander
Categories: Computers
Type: BOOK - Published: 2009-04-30 - Publisher: Bloomsbury Publishing USA

GET EBOOK

In the news on a daily basis are reports of lost or stolen computer data, hacker successes, identity thefts, virus and spyware problems, and network incursions
Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy
Language: en
Pages: 0
Authors: Philip Alexander
Categories: Computers
Type: BOOK - Published: 2009-04-30 - Publisher: Praeger

GET EBOOK

An expert in information security shows readers how to keep their home and small business networks, and data safe from thieves and glitches.
Going Corporate
Language: en
Pages: 345
Authors: Shailendra Kadre
Categories: Business & Economics
Type: BOOK - Published: 2011-08-21 - Publisher: Apress

GET EBOOK

Going Corporate: A Geek's Guide shows technology workers how to gain the understanding and skills necessary for becoming an effective, promotable manager or sou
Effective Model-Based Systems Engineering
Language: en
Pages: 788
Authors: John M. Borky
Categories: Technology & Engineering
Type: BOOK - Published: 2018-09-08 - Publisher: Springer

GET EBOOK

This textbook presents a proven, mature Model-Based Systems Engineering (MBSE) methodology that has delivered success in a wide range of system and enterprise p
Computer Security
Language: en
Pages: 158
Authors: John S. Potts
Categories: Computers
Type: BOOK - Published: 2002 - Publisher: Nova Publishers

GET EBOOK

We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of par