Skip to content
You are not logged in |Login  

LEADER 00000cam a22006611i 4500 
001    on1122870086 
003    OCoLC 
005    20200214023446.0 
006    m     o  d         
007    cr ||||||||||| 
008    190329s2020    nju     o     001 0 eng d 
015    GBB964206|2bnb 
016 7  019349018|2Uk 
020    9781119560340|q(electronic book) 
020    1119560349|q(electronic book) 
020    1119560357 
020    9781119560357|q(electronic book) 
020    |z9781119560326|q(paperback) 
035    (OCoLC)1122870086 
037    9781119560340|bWiley 
037    BD3D32B4-FD0A-4875-8B2B-28A472050978|bOverDrive, Inc.
       |nhttp://www.overdrive.com 
040    UKMGB|beng|erda|epn|cUKMGB|dOCLCO|dTEFOD|dN$T|dOCLCF|dTXM 
049    RIDM 
050  4 QA76.9.A25 
082 04 005.8|223 
090    QA76.9.A25eb 
100 1  Steinberg, Joseph|c(Cybersecurity expert),|0https://
       id.loc.gov/authorities/names/no2017003075|eauthor. 
245 10 Cybersecurity /|cby Joseph Steinberg. 
246 14 Cybersecurity for dummies 
264  1 Hoboken, New Jersey :|bJohn Wiley & Sons, Inc.,|c[2020] 
264  4 |c©2020 
300    1 online resource. 
336    text|2rdacontent 
337    computer|2rdamedia 
338    online resource|2rdacarrier 
347    text file|2rdaft 
490 1  Learning made easy 
490 1  For dummies 
500    Includes index. 
505 0  What exactly is cybersecurity? -- Getting to know common 
       cyberattacks -- Bad guys and accidental bad guys: The 
       folks you must defend against -- Evaluating your current 
       cybersecurity posture -- Enhancing physical security -- 
       Securing your accounts -- Passwords -- Preventing social 
       engineering -- Securing your small business -- 
       Cybersecurity and big businesses -- Identifying a security
       breach -- Recovering from a security breach -- Backing up 
       -- Resetting your device -- Restoring from backups -- 
       Pursuing a cybersecurity career -- Emerging technologies 
       bring new threats -- Ten ways you can improve your 
       cybersecurity without spending a fortune -- Ten lessons 
       from major cybersecurity breaches -- Ten ways to safely 
       use public wi-fi. 
506 1  Concurrent user level: 1 user 
561    Gift of Paul and Mary Haas.  
588    Description based on CIP data; resource not viewed. 
590    Books on EBSCOhost|bAll EBSCO eBooks 
650  0 Computer security.|0https://id.loc.gov/authorities/
       subjects/sh90001862 
650  0 Computer networks|xSecurity measures.|0https://id.loc.gov/
       authorities/subjects/sh94001277 
650  7 Computer security.|2fast|0https://id.worldcat.org/fast/
       872484 
650  7 Computer networks|xSecurity measures.|2fast|0https://
       id.worldcat.org/fast/872341 
776 08 |iPrint version:|z9781119560326 
830  0 Learning made easy.|0https://id.loc.gov/authorities/names/
       n2004037314 
830  0 --For dummies.|0https://id.loc.gov/authorities/names/
       n92122684 
856 40 |zOnline eBook via EBSCO. Access restricted to current 
       Rider University students, faculty, and staff. EBSCOhost
       |uhttps://rider.idm.oclc.org/login?url=http://
       search.ebscohost.com/login.aspx?direct=true&scope=site&
       db=nlebk&db=nlabk&AN=2264641 
856 41 |3Instructions for reading/downloading the EBSCO version 
       of this eBook|uhttp://guides.rider.edu/ebooks/ebsco 
901    MARCIVE 20231220 
948    |d20200214|cMH|tebscopurchased|lridw|lxlcshcompare 
994    C0|bRID