We see that javascript is disabled or not supported by your browser -
javascript is needed
for important actions on the site.
Read more
Skip to main content
What's New
-
Home
-
Login
Member $avings: $
81,554,821.54
|
Books Available:
798,518
|
Members Online: 263
Swap Used Books - Buy New Books at Great Prices!
How To Swap Books
Sign Up
Search
All Books
PBS Market (New Books)
Gift Buying Guide
Book Browser
Advanced Search
Books Posted Today
Member Book Reviews
Award Winning Books
NYT Best Sellers
Amazon Best Sellers
Most Traveled Copies
Club Wish List
Login
Community
Discussion Forums
Book Lists
Club Lists
My Book Lists
My Watched Lists
Create a List
Blog
Donations
School Donation Program
In Memory of...
Military Donation Program
Friends of PBS
Box-O-Books
Maps
The Eclectic Pen
Fun Stuff
20 Questions
Sudoku
Bookmark Creator
Top 100
Wishes
Requests
Posts
Swappers
Referrers
Reviewers
Pulse of PBS
Spread The Word
Invite Friends
Bookmarks
Facebook Page
Facebook App
More Ways...
Photo Gallery
Recipes
Club Tag Cloud
Member Testimonials
Help Center
How To Swap Books
Browse Help Docs
Ask the Librarian
PBS Member Icons
Live Help
Kiosk
PBS Market (New Books)
Go Shopping
Buy Credits
Buy PBS Money
Upgrade Membership
Gift Certificates
Transfer Credits
Need Help?
Visit the Help Center
-
Close X
How to Swap Books
Sign Up
Login
Community
Help Center
Kiosk
Want fewer ads?
Search
- Hack Proof Your Business
Hack Proof Your Business
Author:
Chris Wiser
,
Jeri Morgan
,
Michael Daley
,
John Kistler
,
Bart Barcewicz
,
Umut Bitlisli
,
Bill Bunnell
,
Roy Richardson
,
Jess Coburn
,
Ross Brouse
Articles by "12 IT Experts Nationwide": — Foreward by Chris Wiser — "Real Life Hacking" - Umut Bitlisli — "Employee Hygiene: Training Your Employees to Avoid Cyber Attacks" - Jeri Morgan — "The Real Reason for Cyber-Security Risk Assessment" - Bart Barcewicz — "Developing a Layered Security Approach"
...
more »
- Jason Penka
"Preventing Hacks with a Technology Success Plan" - Ross Brouse
"Social Engineering, Spear-phishing, Whaling, and How Not to Be a Victim" - Bill Bunnell
"How to Develop a Business Continuity Plan" - Duleep Pillai
"The Importance of Email Security" - Jess Coburn
"Endpoint Detection and Response vs. Traditional Anti-Virus" - John Kistler
"Securing Your Shadow IT" - Roy Richardson
"Insider Threats: What They Are and How to Prevent Them" - Michael Daley
"Backup Your Data Right, the First Time" - Igor Pinchevskiy
« less
Post This Book
+ Reminder
Login | Register
ISBN-13:
9781988925431
ISBN-10:
1988925436
Publication Date:
10/16/2019
Pages:
163
Rating:
?
0
stars, based on
0
rating
Publisher:
Prominence Publishing
Book Type:
Paperback
Reviews:
Amazon
|
Write a Review
Genres:
Business & Money
>>
Education & Reference
>>
Ethics
Computers & Technology
>>
Networking & Cloud Computing
>>
Internet, Groupware, & Telecommunications
Computers & Technology
>>
Business Technology
>>
Hacking
Computers & Technology
>>
Security & Encryption
>>
Privacy & Online Safety
Want fewer ads?