Share
Fundamental Cyber, Computing and Telephone Security
John Uwaya
(Author)
·
Createspace Independent Publishing Platform
· Paperback
Fundamental Cyber, Computing and Telephone Security - Uwaya, John
Choose the list to add your product or create one New List
✓ Product added successfully to the Wishlist.
Go to My Wishlists
Origin: U.S.A.
(Import costs included in the price)
It will be shipped from our warehouse between
Friday, July 05 and
Wednesday, July 17.
You will receive it anywhere in United Kingdom between 1 and 3 business days after shipment.
Synopsis "Fundamental Cyber, Computing and Telephone Security"
The nerve centre of the modern society is undoubtedly, the computer. And its ubiquity in every sphere of human endeavour is on the rise with frontiers continually pushed by mobile cellular technology - the fastest growing technology ever. Hence smartphones and tablets are increasingly being used to perform the same functions as laptop and desktop computers. Given the enlarged computer concept, many electronic devices have become vulnerable to the same threats facing wireless computing. Hacking risk apart, the portability of computing devices like cell phones, tablets and laptops risks outright theft for intelligence to attack targets. Apparently, mobile devices have become attractive as strategic targets for criminals because they hold vast amounts of sensitive information. That unfortunately puts individuals and society at large at risk of dire consequences. Where corporate or public information are in a compromised personal device, losses are collateral with probable legal consequences. In fact, criminals are sometimes not particular about you but only want to seize and deploy your device as a canon folder to attack others who are high profile targets like governments, corporate bodies and international institutions. That kind of identity theft could unfortunately expose you to the long arm of the law from which criminals themselves are hiding. Therefore, effective computing security should centre on preventing, detecting, and responding to attacks. Those are the objectives in this book with eight chapters altogether on: *The Internet of Things and Anonymity Illusion*Weaponry in Cyber Attacks*lnternet Connectivity and Security Issues*Web Browsers and Secure Browsing *Emails and Implications for Security*General Computing Security*Preventing and Reacting to Identity Theft*Telephone Security
- 0% (0)
- 0% (0)
- 0% (0)
- 0% (0)
- 0% (0)
All books in our catalog are Original.
The book is written in English.
The binding of this edition is Paperback.
✓ Producto agregado correctamente al carro, Ir a Pagar.