An Introduction to Cybersecurity -- How Black Hats Use the Internet -- How Black Hats Use Phishing to Trick You -- How Black Hats Use Malware to Infect Your Computer -- How Black Hats Access Your Accounts -- How Black Hats Tap Your Wires -- How Black Hats Attack the Cloud -- How Black Hats Pirate Your Wireless Internet -- How Black Hats Break Encryption -- How to Stop Black Hats.
Summary:
"An introduction to cybersecurity for readers new to the field. It covers the fundamentals of cybersecurity and shares practical advice on how readers can keep themselves and their computers safe from phishing, malware, network attacks, and other hacker exploits. Provides real-world examples"-- Provided by publisher.
This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.