• Complain

Carey Parker - Firewalls Dont Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies

Here you can read online Carey Parker - Firewalls Dont Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2018, publisher: Apress, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Carey Parker Firewalls Dont Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
  • Book:
    Firewalls Dont Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
  • Author:
  • Publisher:
    Apress
  • Genre:
  • Year:
    2018
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Firewalls Dont Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Firewalls Dont Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourselfstep by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably dont really know. Computers and the Internet have revolutionized the modern world, but if youre like most people, you have no clue how these things work and dont know the real threats.

Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, youd go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; its about armoring yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our datajust like wearing a seat belt, installing smoke alarms, and putting on sunscreen.

Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. The book contains more than 150 tips to make you and your family safer. It includes:

  • Added steps for Windows 10 (Spring 2018) and Mac OS X High Sierra

  • Expanded coverage on mobile device safety

  • Expanded coverage on safety for kids online

  • More than 150 tips with complete step-by-step instructions and pictures

What Youll Learn

  • Solve your password problems once and for all

  • Browse the web safely and with confidence

  • Block online tracking and dangerous ads

  • Choose the right antivirus software for you
  • Send files and messages securely
  • Set up secure home networking

  • Conduct secure shopping and banking online

  • Lock down social media accounts

  • Create automated backups of all your devices

  • Manage your home computers

  • Use your smartphone and tablet safely

  • Safeguard your kids online

  • And more!

Who This Book Is For

Those who use computers and mobile devices, but dont really know (or frankly care) how they work. This book is for people who just want to know what they need to do to protect themselvesstep by step, without judgment, and with as little jargon as possible.

Carey Parker: author's other books


Who wrote Firewalls Dont Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies? Find out the surname, the name of the author of the book and a list of all author's works by series.

Firewalls Dont Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Firewalls Dont Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Carey Parker Firewalls Dont Stop Dragons A Step-by-Step Guide to Computer - photo 1
Carey Parker
Firewalls Dont Stop Dragons A Step-by-Step Guide to Computer Security for Non-Techies 3rd ed.
Carey Parker North Carolina USA Any source code or other supplementary - photo 2
Carey Parker
North Carolina, USA

Any source code or other supplementary material referenced by the author in this book is available to readers on GitHub via the book's product page, located at www.apress.com/9781484238516 . For more detailed information, please visit www.apress.com/source-code .

ISBN 978-1-4842-3851-6 e-ISBN 978-1-4842-3852-3
https://doi.org/10.1007/978-1-4842-3852-3
Library of Congress Control Number: 2018953686
Carey Parker 2018
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights.
While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein.
Distributed to the book trade worldwide by Springer Science+Business Media New York, 233 Spring Street, 6th Floor, New York, NY 10013. Phone 1-800-SPRINGER, fax (201) 348-4505, e-mail orders-ny@springer-sbm.com, or visit www.springeronline.com. Apress Media, LLC is a California LLC and the sole member (owner) is Springer Science + Business Media Finance Inc (SSBM Finance Inc). SSBM Finance Inc is a Delaware corporation.

To my wife, my mother, my father, and my daughters.

Preface

Lets take a little quiz. If I asked you right now to rate your personal computer security on a scale from one to tenwith ten being Fort Knox and one being a wet paper bagwhat rating would you give yourself? Seriously, give that some thought right now.

Unless youre a techie person, Im going to guess that you dont really know how to come up with that number, and that almost surely means your ranking is closer to the wet paper bag end of the scale. Do you really need to be as secure as Fort Knox? No, of course, not, and thats not what this book is about. However, there are many things you can do (or avoid doing) that will significantly increase your security and privacy, and this book is chock full of them. You dont have to do them alleven I dont do them allbut I firmly believe that everyone should at least consider the specific tips and techniques described in this book.

Im guessing that a few questions are popping into your mind right now. Do I really need this book? Do I need to be a computer person to understand it? How much effort is this going to take? All good questions! Lets answer them right up front.

The answer to the first question is easy: yes! Okay, why do you need this book? Because so many important parts of our lives are moving to the Internet nowbanking, shopping, paying bills, socializing, gaming, you name it. And its not just our desktop computers that are connecting to the Internet, its our laptops, smartphones, tablets, and even appliances. Unlike the days of dial-up modems, our devices are now connected almost 100 percent of the time. These facts have not gone unnoticed by the bad guys. As the famous saying goes, why do criminals rob banks? Because thats where the money is! You need this book because it will make you safersignificantly safer, if you follow most of the advice. In fact, not only will it make you safer, it will make those around you safer, even if they dont do any of the things I recommend in this book. (Ill explain that bit of magic later in the book.)

This book is for my mother, my friends, my neighbors, and all the other totally normal, everyday people like them: people who use computers and mobile devices but dont really know (or frankly care) how they work. This book is for people who just want to know what they need to do to protect themselvesstep-by-step, without judgment, and with as little jargon as possible. Ive structured this book to give you the maximum benefit with the least amount of effort (and cost). The purpose of this book is to cut to the chase and clearly explain the things you need to do to protect yourself in this increasingly connected world of ours. Along the way, if you want to learn a little of the why and how, in language you can understand, Ive included a good bit of that, too. In this book I use a lot of analogies to help explain these technical topics in ways that everyone can understand, and I also include some fascinating stories that help to drive the points home. Ive made this book not only easy to read but I hope even fun to read!

But cant I find all of this information on the Web, you ask? Sure you can! The problem is not lack of informationthe problem is that there is too much . How do you find what you need and weed out the stuff you dont? Most people wouldnt even know what to search for. Even if you knew some of the technical terms, youd still have to collect all the info and figure out what parts are relevant to you. To make matters worse, the common news sources that most people turn to have done a horrible job covering these topics (when they cover them at all). They tend to focus on the wrong things, crank the hype to ridiculous levels, and generally give poor advice. There are lots of good web sites that get it right, but youve probably never heard of them, and they tend to be very technical. If only someone could find all the most important stuff, break it down into manageable pieces, and explain it so anyone can get it.

Thats the main reason Im writing this book. I firmly believe that in this day and age everyone needs a fundamental understanding of computer safetynot only for each individuals sake but also for everyones sake because were all connected now. Its not just about protecting ourselves from criminals who want our money but also from corporations and governments that want to track what we do, what we say, who we associate with, what we buy, what we readwell, basically everything. Its important that we understand all of these threats. My goal is not only to give you the tools you need to protect your data and your privacy but to arm you with the knowledge you need to be an informed citizen when it comes time to vote, either at the ballot box or at the cash register.

So, lets get to it!

A Note to My Fellow Geeks

If youre a techie person, then youre probably the go-to IT guy (or gal) in the family. Your friends constantly ask you for advice when buying a computer. Your relatives e-mail you whenever their Mac is acting funny. And your college-aged niece who downloads tons of free music and movies cant understand why her PC is riddled with viruses. If youre a real softie, you probably forward them e-mails about scams to watch out for, web sites to avoid, and suggestions on how to protect their privacy. Most of the time, your advice is never followed, unless you give them detailed, step-by-step instructions or just do it for them. Remote desktop sharing has saved you much time and effort, but its still frustrating trying to keep your friends and loved ones safe and up-to-date.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Firewalls Dont Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies»

Look at similar books to Firewalls Dont Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Firewalls Dont Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies»

Discussion, reviews of the book Firewalls Dont Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.