𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Digital Cop: A Digital Cop's Guide to Cyber Security

✍ Scribed by Baghla, Sahil;Soni, Arun


Publisher
Notion Press
Year
2017;2015
Tongue
English
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Authors and ardent techies, Sahil Baghla and Arun Soni share their innate wisdom on protecting yourself and your family from certain vices of technology. They also show us how to make the most of it! With just a little help from our trusty computers and smart phones, the duo educate us on a variety of practical applications and online safeguards to help us get the best out of technology and not get beat down by it.Did you know that there are actually applications to enable us to send a 'self-destruct' message?Did you know that you can convert your free time into a lucrative career by getting genuine work online?Why and how is your computer susceptible to a virus, and how can you prevent people from hacking into your email account?How do you track someone's location using their phone GPS, and how do you use your smart phone to check for hidden cameras?These are only some of the questions to which you will finally have the answers! From the ordinary and practical to the amusing, they give you solutions that range from the mundane to the ingenious! And in a language that's simple, and easy to follow ...Read on. 'Digital Cop' promises to serve and cyber secure everyone!

✦ Subjects


Computer networks--Security measures;Computer security;;Popular works;Computer security -- Popular works;Computer networks -- Security measures -- Popular works;Computer networks -- Security measures


πŸ“œ SIMILAR VOLUMES


Cyber Cop
✍ Patricia Hynes πŸ“‚ Library πŸ“… 2007 πŸ› Cherry Lake Publishing 🌐 English
Digital Forensics and Incident Response:
✍ Gerard Johansen πŸ“‚ Library πŸ“… 2017 πŸ› Packt Publishing 🌐 English

Key Features β€’ Learn incident response fundamentals and create an effective incident response framework β€’ Master forensics investigation utilizing digital investigative techniques β€’ Contains real-life scenarios that effectively use threat intelligence and modeling techniques Book Description