๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Cover of Build Your Computer Security Skills

Build Your Computer Security Skills

โœ Scribed by Adam Furgang; Christopher Harris


Book ID
110715118
Publisher
Enslow Publishing, LLC
Year
2019
Tongue
English
Weight
6 MB
Series
Unplugged Activities for Future Coders
Category
Fiction
ISBN-13
9781978510661

No coin nor oath required. For personal study only.

โœฆ Synopsis


Computers have become enmeshed in almost every aspect of modern life. While this development has made our lives easier and more convenient, it also opens us up to all sorts of security risks. The dozen activities in this volume emphasize the importance of computer security and delve into the steps that both coders and ordinary users of technology can take to improve their computer security. Individual activities explore topics such as encryption, coming up with secure passwords, two-step verification, phishing, and fingerprint identification.


๐Ÿ“œ SIMILAR VOLUMES


cover
โœ Christopher Harris ๐Ÿ“‚ Fiction ๐Ÿ“… 2019 ๐Ÿ› Enslow Publishing, LLC ๐ŸŒ English โš– 6 MB

The dozen activities in this book don't require a computer, but will help readers become masters at computational thinking. This volume stars out with activities highlighting the necessity of giving clear, direct instructions. It continues to include instructions that introduce readers to concept of

cover
โœ Kathy Furgang ๐Ÿ“‚ Fiction ๐Ÿ“… 2019 ๐Ÿ› Enslow Publishing, LLC ๐ŸŒ English โš– 6 MB

A single error in a line of code can cause a computer program to go haywire or stop working entirely. Luckily coding has a process for dealing with errors: debugging. Debugging consists of finding and fixing errors in code. You don't have to work as a coder to develop your debugging skills, though.

cover
โœ Christopher Harris ๐Ÿ“‚ Fiction ๐Ÿ“… 2019 ๐Ÿ› Enslow Publishing, LLC ๐ŸŒ English โš– 5 MB

From the simplest applications to the largest networking centers, algorithms are the heartbeat of computer science. The beauty of computers is their ability to automate processes, and algorithms are the tools coders use to make that possible. They employ core computational thinking skills, including

Addressing your information security ski
โœ Bill Pepper ๐Ÿ“‚ Article ๐Ÿ“… 1997 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 225 KB

rity control as one might imagine. Worse yet, part of Windows NT networking is based on old protocols (dating back to the 1970s when networking was in its infancy and when network security was hardly a concern). The fact that the same TCP/IP and UPD/UP services that have introduced so many security-