17,99 €
inkl. MwSt.

Versandfertig in 1-2 Wochen
payback
9 °P sammeln
  • Broschiertes Buch

This is a book that is going to provide you detailed information about the threats that you and your computer have when you enter the world of internet. It will discuss different ways through which you could protect yourself from intruders. This book covers all the major kinds of threats that you face when you go online. The book will even discuss the threats that your kids face when they go online. Since kids are not experienced and they are unaware of the consequences of the step they are going to take thus it is important for the parents to know the dangers their kids face on the world of…mehr

Produktbeschreibung
This is a book that is going to provide you detailed information about the threats that you and your computer have when you enter the world of internet. It will discuss different ways through which you could protect yourself from intruders. This book covers all the major kinds of threats that you face when you go online. The book will even discuss the threats that your kids face when they go online. Since kids are not experienced and they are unaware of the consequences of the step they are going to take thus it is important for the parents to know the dangers their kids face on the world of internet. It is a kind of book that you should be bound to read once you get in an age where you start using computer and the internet. The book doesn't only highlights the issues that one faces when they go online but it also provides the solution to the problems. Not only this but after reading the book you will be able to get to know about different technical terms, the reason they present a threat to your computer and the signals that you need to look for if you doubt you have become a victim. The book begins with the introduction to computer security and provides the reader with an overview of the issues and the threats that your computer could face if you do not care about it. The readers will be amazed to find the section on social media threats. Most of the people are not actually aware of the threats that they face when they sign up on a social media website. Thus the book is going to talk about the ways to protect your identity even if you have signed up for a social media website. Anzar Hassan and Abbas Mirza are the writers of this book. They intend to take ahead the initiative of cyber security. They both developed G7 Security in the year 2010 while working under Arshnet Technologies. This app could currently be found on app store. It was one of the most operative step that was taken in order to educate people about cyber security. It was extremely important to launch it because people were not able to find a viable solution to the problem of cyber-attacks. G7Security is Cyber Security Research and Global Information Security Services entity. This entity offers research and development, information sharing and collaboration. In addition to this it is offers various services for the Information and Cyber Security community. The efforts made to develop G7 Security app were recognized in Computer World's Mobile Access awards category for the innovative application of IT. The major aim of this app was to extend the distribution of digital information, programs and services through mobile devices. This was the reason due to which it was able to reach to the areas where use of mobile devices is quite common. Computerworld Honors Program honors those who try to develop visionary applications of information technology through which they try promote positive social, economic and educational change. Their basic aim behind this book was to ensure that a non-technical person gets to know about the threats and dangers that he and his devices faces once he connects himself to the internet. This book plays an important role in fulfilling the basic aim of the authors. After reading this book you will be able to realize the fact that you were living life in danger by connecting your computer to the internet. But by following the right steps you will be able to secure your device and your identity from being misused.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Autorenporträt
Anzar Hasan Anzar Hasan is one of the leading information security audit professionals. He provided his services to Verizon's Internal Audit Department. Before utilizing his services for Verizon, Anzar worked with the Deloitte & Touche and other notable Fortune 100 companies. He has vast experience in telecommunications/IT/IS security. He graduated in electronics from NED University of Engineering and Technology. He is a CISSP and CISM. Anzar also has graduate certificates in business analytics from Southern Methodist University (SMU) and crisis management and business continuity from Massachusetts Institute of Technology (MIT). Anzar is a member of the IEEE study groups and a frequent speaker at international conferences in the telecom industry, such as LTE, Small Cells, Virtualization North America, and many more. Anzar serves as a board member for the American Cyber Security Association. Abbas Mirza Abbas Mirza is one of the renowned personalities in the computer world. He has over fifteen years of experience in architecture, analysis, design, development, implementation, and management of information technology systems. He is the laureate of the Computerworld Honors Program 2013. He is currently a part of PepsiCo. He has managed cross-functional teams to execute highly productive projects. In the year 2010, Abbas was able to launch the G7 Security app. G7 Security is a cybersecurity research and global information security services entity. This particular entity was developed by Abbas and Anzar so that they could make a head start on the initiative of cybersecurity. Abbas earned his bachelor's degree in business computer information systems from Midwestern State University and advanced training from Southern Methodist University (SMU). "After reading this book, you will be able to realize the fact that you were living a dangerous life by connecting your computer to the Internet. But by following the right steps, you will be able to secure your device and your identity from being misused."