Chapter
Publicly Available
Frontmatter
-
Scott Donaldson
Chapters in this book
- Frontmatter I
- About DeG PRESS VII
- Acknowledgments IX
- About the Authors XI
- Contents XV
- Introduction XIX
- Chapter 1. Security Mindset 1
- Chapter 2. Common Cybersecurity Attacks 9
- Chapter 3. Protecting Your Computer(s) 23
- Chapter 4. Protecting Your Passwords 35
- Chapter 5. Protecting Your Home Network 45
- Chapter 6. Smartphones and Tablets 55
- Chapter 7. Protecting Your Web Browsing 65
- Chapter 8. Protecting Your E-Mail and Phone Calls 75
- Chapter 9. Protecting Your Identity, Privacy, and Family Online 87
- Chapter 10. Protecting Yourself on Travel 101
- Chapter 11. When Things Go Wrong 113
- Chapter 12. Considering Cybersecurity at Work 131
- Chapter 13. Final Thoughts 147
- Appendix A. Common Online Scams 149
- Appendix B. The Worst Passwords Ever 157
- Appendix C. Online Security Resources 159
- Glossary 167
- Index 175
Chapters in this book
- Frontmatter I
- About DeG PRESS VII
- Acknowledgments IX
- About the Authors XI
- Contents XV
- Introduction XIX
- Chapter 1. Security Mindset 1
- Chapter 2. Common Cybersecurity Attacks 9
- Chapter 3. Protecting Your Computer(s) 23
- Chapter 4. Protecting Your Passwords 35
- Chapter 5. Protecting Your Home Network 45
- Chapter 6. Smartphones and Tablets 55
- Chapter 7. Protecting Your Web Browsing 65
- Chapter 8. Protecting Your E-Mail and Phone Calls 75
- Chapter 9. Protecting Your Identity, Privacy, and Family Online 87
- Chapter 10. Protecting Yourself on Travel 101
- Chapter 11. When Things Go Wrong 113
- Chapter 12. Considering Cybersecurity at Work 131
- Chapter 13. Final Thoughts 147
- Appendix A. Common Online Scams 149
- Appendix B. The Worst Passwords Ever 157
- Appendix C. Online Security Resources 159
- Glossary 167
- Index 175