Millions of books in English, Spanish and other languages. Free UK delivery 

menu

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada Fundamental Cyber, Computing and Telephone Security
Type
Physical Book
Language
English
Pages
104
Format
Paperback
Dimensions
21.6 x 14.0 x 0.7 cm
Weight
0.18 kg.
ISBN13
9781985350946

Fundamental Cyber, Computing and Telephone Security

John Uwaya (Author) · Createspace Independent Publishing Platform · Paperback

Fundamental Cyber, Computing and Telephone Security - Uwaya, John

Physical Book

£ 21.94

  • Condition: New
Origin: U.S.A. (Import costs included in the price)
It will be shipped from our warehouse between Monday, June 24 and Wednesday, July 10.
You will receive it anywhere in United Kingdom between 1 and 3 business days after shipment.

Synopsis "Fundamental Cyber, Computing and Telephone Security"

The nerve centre of the modern society is undoubtedly, the computer. And its ubiquity in every sphere of human endeavour is on the rise with frontiers continually pushed by mobile cellular technology - the fastest growing technology ever. Hence smartphones and tablets are increasingly being used to perform the same functions as laptop and desktop computers. Given the enlarged computer concept, many electronic devices have become vulnerable to the same threats facing wireless computing. Hacking risk apart, the portability of computing devices like cell phones, tablets and laptops risks outright theft for intelligence to attack targets. Apparently, mobile devices have become attractive as strategic targets for criminals because they hold vast amounts of sensitive information. That unfortunately puts individuals and society at large at risk of dire consequences. Where corporate or public information are in a compromised personal device, losses are collateral with probable legal consequences. In fact, criminals are sometimes not particular about you but only want to seize and deploy your device as a canon folder to attack others who are high profile targets like governments, corporate bodies and international institutions. That kind of identity theft could unfortunately expose you to the long arm of the law from which criminals themselves are hiding. Therefore, effective computing security should centre on preventing, detecting, and responding to attacks. Those are the objectives in this book with eight chapters altogether on: *The Internet of Things and Anonymity Illusion*Weaponry in Cyber Attacks*lnternet Connectivity and Security Issues*Web Browsers and Secure Browsing *Emails and Implications for Security*General Computing Security*Preventing and Reacting to Identity Theft*Telephone Security

Customers reviews

More customer reviews
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Frequently Asked Questions about the Book

All books in our catalog are Original.
The book is written in English.
The binding of this edition is Paperback.

Questions and Answers about the Book

Do you have a question about the book? Login to be able to add your own question.

Opinions about Bookdelivery

More customer reviews