- Table View
- List View
Security without Obscurity: Frequently Asked Questions (FAQ)
by Jeff StapletonSecurity without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton’s three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.
Security without Obscurity: A Guide to PKI Operations
by Jeff Stapleton W. Clay EpsteinMost books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. While algorithms, certificates, and theoretical policy are all excellent discussions, the real-world issues for operating a commercial or
Security Without Obscurity: A Guide to PKI Operations
by Jeff Stapleton W. Clay EpsteinPublic Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information technology (IT), information security (cybersecurity), policy and practices, legal matters (law, regulatory, contractual, privacy), and business rules (processes and procedures). A properly managed PKI requires all of these disparate disciplines to function together – coherently, efficiently, effectually, and successfully. Clearly defined roles and responsibilities, separation of duties, documentation, and communications are critical aspects for a successful operation. PKI is not just about certificates, rather it can be the technical foundation for the elusive "crypto-agility," which is the ability to manage cryptographic transitions. The second quantum revolution has begun, quantum computers are coming, and post-quantum cryptography (PQC) transitions will become PKI operation’s business as usual.
sed and awk Pocket Reference
by Arnold RobbinsFor people who create and modify text files, sed and awk are power tools for editing. sed, awk, and regular expressions allow programmers and system administrators to automate editing tasks that need to be performed on one or more files, to simplify the task of performing the same edits on multiple files, and to write conversion programs. The sed & awk Pocket Reference is a companion volume to sed & awk, Second Edition, Unix in a Nutshell, Third Edition, and Effective awk Programming, Third Edition. This new edition has expanded coverage of gawk (GNU awk), and includes sections on: An overview of sed and awk?s command line syntax Alphabetical summaries of commands, including nawk and gawk Profiling with pgawk Coprocesses and sockets with gawk Internationalization with gawk A listing of resources for sed and awk users This small book is a handy reference guide to the information presented in the larger volumes. It presents a concise summary of regular expressions and pattern matching, and summaries of sed and awk. Arnold Robbins, an Atlanta native now happily living in Israel, is a professional programmer and technical author and coauthor of various O'Reilly Unix titles. He has been working with Unix systems since 1980, and currently maintains gawk and its documentation.
sed & awk
by Dale Dougherty Arnold Robbinssed & awk describes two text processing programs that are mainstays of the UNIX programmer's toolbox. sed is a "stream editor" for editing streams of text that might be too large to edit as a single file, or that might be generated on the fly as part of a larger data processing step. The most common operation done with sed is substitution, replacing one block of text with another. awk is a complete programming language. Unlike many conventional languages, awk is "data driven" -- you specify what kind of data you are interested in and the operations to be performed when that data is found. awk does many things for you, including automatically opening and closing data files, reading records, breaking the records up into fields, and counting the records. While awk provides the features of most conventional programming languages, it also includes some unconventional features, such as extended regular expression matching and associative arrays. sed & awk describes both programs in detail and includes a chapter of example sed and awk scripts. This edition covers features of sed and awk that are mandated by the POSIX standard. This most notably affects awk, where POSIX standardized a new variable, CONVFMT, and new functions, toupper() and tolower(). The CONVFMT variable specifies the conversion format to use when converting numbers to strings (awk used to use OFMT for this purpose). The toupper() and tolower() functions each take a (presumably mixed case) string argument and return a new version of the string with all letters translated to the corresponding case. In addition, this edition covers GNU sed, newly available since the first edition. It also updates the first edition coverage of Bell Labs nawk and GNU awk (gawk), covers mawk, an additional freely available implementation of awk, and briefly discusses three commercial versions of awk, MKS awk, Thompson Automation awk (tawk), and Videosoft (VSAwk).
sed & awk Pocket Reference, 2nd Edition
by Arnold RobbinsThis handy little book is an indispensable reference to information presented in O'Reilly's larger volumes, sed & awk, 2nd Edition and Effective awk Programming. A perfect pocket- sized guide, sed & awk Pocket Reference offers a concise summary of regular expressions and pattern matching, and summaries of sed and awk. The book emphasizes the kinds of practical problems that sed and awk can help users solve, with many example scripts and programs. Also included is a summary of sed and awk's functions and commands, with expanded coverage of TCP/IP networking and internationalization with gawk.
sed & awk Pocket Reference, Second Edition
by Arnold RobbinsThe sed & awk Pocket Reference is a handy, quick reference guide to frequently used functions, commands, and regular expressions used for day-to-day text processing needs. This book is a companion to both sed & awk, Second Edition and Effective awk Programming, Third Edition.
sed & awk, Second Edition
by Dale Dougherty Arnold Robbinssed & awk describes two text manipulation programs that are mainstays of the UNIX programmer's toolbox. This edition covers the sed and awk programs as they are mandated by the POSIX standard and includes discussion of the GNU versions of these programs.
Seduce Me: A Stark Ever After Novella (Stark Series #18)
by J. KennerNew York Times bestselling author J. Kenner continues her beloved Stark series with a scorching-hot Stark Ever After novella for Nikki and Damien Stark as they make an impromptu getaway to Las Vegas. For fans of Fifty Shades of Grey, Sylvia Day, Meredith Wild and Jodi Ellen Malpas. There's no better place to turn up the heat than in Sin City...I've never felt as close to anyone as I have with Damien Stark. I know every line of his body, every secret within his soul. There's nothing I crave more than his touch, and with his kiss, he seals his claim.Las Vegas is the perfect place for us, where we can indulge every desire and fantasy. But when someone from my past resurfaces, I can't ignore my instinct that I have to make things right.With Damien by my side, I feel safe no matter the danger. Our passion protects us, drives us, makes us whole. His pleasure is an exquisite game, and one that I'll play forever.Find out how it all began for Damien and Nikki in J. Kenner's hot and addictive bestselling Stark series: Release Me, Claim Me, Complete Me, Take Me, Have Me and Play My Game.Return to the smoking hot Stark world with the Stark International trilogy: Say My Name, On My Knees and Under My Skin is the explosively emotional story of Jackson Steele and Sylvia Brooks.Don't miss J. Kenner's sizzling Most Wanted series of three enigmatic and powerful men, and the striking women who can bring them to their knees: Wanted, Heated and Ignited.***SEDUCE ME was previously published for a limited time in the SWEET SEDUCTION anthology***
The Seductive Computer
by Derek PartridgeIT systems explode budget estimates, bust production deadlines by years, and then fail to work properly. Why this IT-system crisis? Poor programmers? Inadequate project management? No. The Seductive Computer argues that the fundamental nature of programming technology itself is the real culprit; it promises perfection but can only deliver emergent chaos. It is also an insidiously compelling technology, peculiarly male oriented. IT systems, an unavoidable and increasing reality in all our lives, are something new to man - large-scale discrete complexity. The Seductive Computer explains this novelty that defies human understanding. This book illustrates in a simple yet thorough manner the underlying concepts necessary for understanding the IT-system crisis - not 'How To Program' but what the demands of programming are. It then proceeds to lay out the full gamut of issues - all stemming from the nature of the technology. From development to maintenance IT-system personnel are grappling with incipient chaos. The technicians are seduced by the detailed challenge of the technology. The scientists are seduced by the promises of their technology. The managers and users are seduced by the mysteries of the technology. No IT system is ever fully understood by anyone, so surprising behaviours will always emerge. What can be done? We must rein in our expectations of IT systems: what they can do, and how reliably they can do it. On the positive side, The Seductive Computer discusses novel paradigms that look beyond the current discrete technology: neural computing and precise approximation computing.
See It: Photographic Composition Using Visual Intensity
by Josh Anon Ellen AnonA good image is more than just acceptable exposure and sharp focus -- two components that photography instruction concentrates on. A fascinating subject doesn't necessarily result in a good image, and likewise, it's possible to create an outstanding image of a mundane subject. So how do you know the difference? Perhaps you've read a lot of material on how to use your camera, how to manage images, and/or how to make adjustments using different software programs. What usually is not covered is what needs to be done beyond obvious exposure, noise, and sharpening issues so that you can intuitively recognize the difference between a good and bad image, and most importantly, why. That's where this book comes in. Rather than wasting time blindly trying one approach or another until something seems right, the quality of your imagery and the speed of your workflow will both vastly improve once you are able to articulate why you prefer one image to another. Expert authors Josh and Ellen Anon have spent years perfecting their visual-intensity based approach to composition, and in this gorgeous, full color guide, they'll share their techniques with you so that your overall photographic experience, both in terms of time investment and quality of output, will become a much more satisfying one.
See What I Mean
by Kevin ChengIf you're an executive, designer, product manager, marketer, or engineer, communication is part of your work. Using images and text in unique ways, comics can engage readers in ways traditional methods can't. In See What I Mean, you'll learn how to create comics about your products and processes without an illustrator—just like Google, eBay, and Adobe do.
See Ya Later: The World According to Arron Crascall
by Arron CrascallAlright guys? It's me, Arron. Or as some people call me, 'that guy with the phone, the skinny jeans and the really fat head'.In a world that seems to be freefalling without a parachute towards utter chaos, I'm here to remind you that when life gives you lemons, make lemonade. No, in fact, when life gives you lemons, make a fool out of yourself in the lemonade aisle.*Because there's more to life than Brexit, Bake Off and banging on about being vegan. Yes, with this book - which is my take on the world - you will learn how to survive a proper lads' holiday, become a master in the art of takeaway ordering and find out about the pitfalls of seriously inappropriate tattoos.So do yourself a favour: turn off the news, cancel that juice cleanse, open your eyes to the brilliant, hilarious world we live in and most importantly . . . buy this book.SEE YA LATER! Arron x*Actually, don't do exactly that, that's my thing.
See Yourself in Cyber: Security Careers Beyond Hacking
by Ed AdamsA one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organization In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone. You’ll discover how developers, DevOps professionals, managers, and others can strengthen your cybersecurity. You’ll also find out how improving your firm’s diversity and inclusion can have dramatically positive effects on your team’s talent. Using the familiar analogy of the color wheel, the author explains the modern roles and responsibilities of practitioners who operate within each “slice.” He also includes: Real-world examples and case studies that demonstrate the application of the ideas discussed in the book Many interviews with established industry leaders in a variety of disciplines explaining what non-security professionals can do to improve cybersecurity Actionable strategies and specific methodologies for professionals working in several different fields interested in meeting their cybersecurity obligationsPerfect for managers, directors, executives, and other business leaders, See Yourself in Cyber: Security Careers Beyond Hacking is also an ideal resource for policymakers, regulators, and compliance professionals.
Seeing Autism through Parents’ Feedback, Sketchnotes, Technology, and Evidence-based Practices (Educational Communications and Technology: Issues and Innovations)
by Demetria Ennis-ColeSeeing Autism is a comprehensive but easy-to-understand guidebook for caretakers, parents, educators, counselors, therapists, and researchers on various aspects of rearing and supporting children with autism spectrum disorder. It provides textual and visual information on technology tools, symptoms, diagnosis, auditory, sensory, visual, physical, and educational issues, as well as strategies and practices to help children on the Autism Spectrum reach their potential. Seeing Autism uniquely capitalizes on sketchnotes, a visual thinking tool, to communicate information and practices. Sketchnotes provide a unique space that can help the reader think differently, generate a variety of ideas, explore alternatives, and develop constructive points for expressing ideas and developing visual communication aids. This book will assist parents, educators, and professionals in schools (counselors, school psychologists, librarians) who work with children diagnosed with ASD; it will help readers increase their knowledge of autism and gain an appreciation for evidence-based practices and forms of technology that can be used to support learners on the autism spectrum. “This book is a call to arms and is as much a resource for the family friend as it is for the provider coming to the home. In the book Seeing Autism, Dr. Demetria Ennis-Cole helps individuals gain an incredible perspective and learn the struggles, challenges and joys of families rearing children, teens and adults on the spectrum. This book covers the entire spectrum and is a fantastic mix of research, parent perspective, and even sketchnotes for visual learners. The material is well-balanced and is a great resource to support individuals on the spectrum at home, in the community or in the classroom." Brad McGarryFather, Speaker, Author and Director of the Autism Initiative at Mercyhurst University
Seeing Cities Through Big Data
by Piyushimita Vonu Thakuriah Nebiyou Tilahun Moira ZellnerThis book introduces the latest thinking on the use of Big Data in the context of urban systems, including research and insights on human behavior, urban dynamics, resource use, sustainability and spatial disparities, where it promises improved planning, management and governance in the urban sectors (e. g. , transportation, energy, smart cities, crime, housing, urban and regional economies, public health, public engagement, urban governance and political systems), as well as Big Data's utility in decision-making, and development of indicators to monitor economic and social activity, and for urban sustainability, transparency, livability, social inclusion, place-making, accessibility and resilience.
Seeing Red: Nintendo's Virtual Boy (Platform Studies)
by Jose P. Zagal Benj EdwardsThe curious history, technology, and technocultural context of Nintendo&’s short-lived stereoscopic gaming console, the Virtual Boy.With glowing red stereoscopic 3D graphics, the Virtual Boy cast a prophetic hue: Shortly after its release in 1995, Nintendo's balance sheet for the product was "in the red" as well. Of all the innovative long shots the game industry has witnessed over the years, perhaps the most infamous and least understood was the Virtual Boy. Why the Virtual Boy failed, and where it succeeded, are questions that video game experts José Zagal and Benj Edwards explore in Seeing Red, but even more interesting to the authors is what the platform actually was: what it promised, how it worked, and where it fit into the story of gaming.Nintendo released the Virtual Boy as a standalone table-top device in 1995—and quickly discontinued it after lackluster sales and a lukewarm critical reception. In Seeing Red, Zagal and Edwards examine the device's technical capabilities, its games, and the cultural context in the US in the 1990s when Nintendo developed and released the unusual console. The Virtual Boy, in their account, built upon and extended an often-forgotten historical tradition of immersive layered dioramas going back 100 years that was largely unexplored in video games at the time. The authors also show how the platform's library of games conveyed a distinct visual aesthetic style that has not been significantly explored since the Virtual Boy's release, having been superseded by polygonal 3D graphics. The platform's meaning, they contend, lies as much in its design and technical capabilities and affordances as it does in an audience's perception of those capabilities. Offering rare insight into how we think about video game platforms, Seeing Red illustrates where perception and context come, quite literally, into play.
Seeing Smart Cities Through a Multi-Dimensional Lens: Perspectives, Relationships, and Patterns for Success
by H. Patricia McKennaThis book provides an interdisciplinary lens for exploring, assessing, and coming to new understandings of smart cities and regions, focusing on the six dimensions of sensing, awareness, learning, openness, innovation, and disruption. Using a hybrid case study and correlational approach, people from diverse sectors in a variety of small to medium to large-sized cities in multiple countries (e.g., Canada, United States, Ireland, Greece, Israel, etc.) provide experience-based perspectives on smart cities together with assessments for elements pertaining to each of the six dimensions.The analysis of findings in this work surfaces a rich and interwoven tapestry of patterns from the qualitative data highlighting for example, the importance of emotion/affect, privacy, trust, and data visualizations in influencing and informing the directions of smart cities and regions going forward. Correlational analysis of quantitative data reveals the presence and strength of emerging relationships among elements assessed, shedding light on factors that may serve as starting points for understanding what is contributing to potentials for improving success in smart cities and regions.
Seeing the Future with Imaging Science: Interdisciplinary Research Team Summaries
by The National AcademiesImaging science has the power to illuminate regions as remote as distant galaxies, and as close to home as our own bodies. Many of the disciplines that can benefit from imaging share common technical problems, yet researchers often develop ad hoc methods for solving individual tasks without building broader frameworks that could address many scientific problems. At the 2010 National Academies Keck Futures Initiative Conference on Imaging Science, researchers from academia, industry, and government formed 14 interdisciplinary teams created to find a common language and structure for developing new technologies, processing and recovering images, mining imaging data, and visualizing it effectively. The teams spent nine hours over two days exploring diverse challenges at the interface of science, engineering, and medicine. NAKFI Seeing the Future with Imaging Science contains the summaries written by each team. These summaries describe the problem and outline the approach taken, including what research needs to be done to understand the fundamental science behind the challenge, the proposed plan for engineering the application, the reasoning that went into it, and the benefits to society of the problem solution.
Seeking SRE: Conversations About Running Production Systems at Scale
by David N. Blank-EdelmanOrganizations big and small have started to realize just how crucial system and application reliability is to their business. They’ve also learned just how difficult it is to maintain that reliability while iterating at the speed demanded by the marketplace. Site Reliability Engineering (SRE) is a proven approach to this challenge.SRE is a large and rich topic to discuss. Google led the way with Site Reliability Engineering, the wildly successful O’Reilly book that described Google’s creation of the discipline and the implementation that’s allowed them to operate at a planetary scale. Inspired by that earlier work, this book explores a very different part of the SRE space. The more than two dozen chapters in Seeking SRE bring you into some of the important conversations going on in the SRE world right now.Listen as engineers and other leaders in the field discuss:Different ways of implementing SRE and SRE principles in a wide variety of settingsHow SRE relates to other approaches such as DevOpsSpecialties on the cutting edge that will soon be commonplace in SREBest practices and technologies that make practicing SRE easierThe important but rarely explored human side of SREDavid N. Blank-Edelman is the book’s curator and editor.
The Sega Mega Drive & Genesis Encyclopedia: Every Game Released for Sega's 16-bit Console
by Chris Scullion“An exhaustive, tremendous look back at one of the most beloved consoles of all time . . . an absolutely barnstorming recollection of a wonderful era.” —Finger GunsThe third book in Chris Scullion’s series of video game encyclopedias, The Sega Mega Drive and Genesis Encyclopedia is dedicated to Sega’s legendary 16-bit video game console. The book contains detailed information on every single game released for the Sega Mega Drive and Genesis in the west, as well as similarly thorough bonus sections covering every game released for its add-ons, the Mega CD and 32X. With nearly a thousand screenshots, generous helpings of bonus trivia and charmingly bad jokes, The Sega Mega Drive and Genesis Encyclopedia is the definitive guide to a legendary gaming system.“The Sega Mega Drive and Genesis Encyclopedia is a must-buy for fans of the console and a perfect addition to any retro game fan’s library.” —Goomba Stomp Magazine
Segmentation and Separation of Overlapped Latent Fingerprints: Algorithms, Techniques, and Datasets (SpringerBriefs in Computer Science)
by Branka Stojanović Oge Marques Aleksandar NeškovićThis Springerbrief presents an overview of problems and technologies behind segmentation and separation of overlapped latent fingerprints, which are two fundamental steps in the context of fingerprint matching systems. It addresses five main aspects: (1) the need for overlapped latent fingerprint segmentation and separation in the context of fingerprint verification systems; (2) the different datasets available for research on overlapped latent fingerprints; (3) selected algorithms and techniques for segmentation of overlapped latent fingerprints; (4) selected algorithms and techniques for separation of overlapped latent fingerprints; and (5) the use of deep learning techniques for segmentation and separation of overlapped latent fingerprints.By offering a structured overview of the most important approaches currently available, putting them in perspective, and suggesting numerous resources for further exploration, this book gives its readers a clear path for learning new topics and engaging in related research. Written from a technical perspective, and yet using language and terminology accessible to non-experts, it describes the technologies, introduces relevant datasets, highlights the most important research results in each area, and outlines the most challenging open research questions.This Springerbrief targets researchers, professionals and advanced-level students studying and working in computer science, who are interested in the field of fingerprint matching and biometrics. Readers who want to deepen their understanding of specific topics will find more than one hundred references to additional sources of related information.
Segmentation, Classification, and Registration of Multi-modality Medical Imaging Data: MICCAI 2020 Challenges, ABCs 2020, L2R 2020, TN-SCUI 2020, Held in Conjunction with MICCAI 2020, Lima, Peru, October 4–8, 2020, Proceedings (Lecture Notes in Computer Science #12587)
by Nadya Shusharina Mattias P. Heinrich Ruobing HuangThis book constitutes three challenges that were held in conjunction with the 23rd International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2020, in Lima, Peru, in October 2020*: the Anatomical Brain Barriers to Cancer Spread: Segmentation from CT and MR Images Challenge, the Learn2Reg Challenge, and the Thyroid Nodule Segmentation and Classification in Ultrasound Images Challenge.The 19 papers presented in this volume were carefully reviewed and selected form numerous submissions. The ABCs challenge aims to identify the best methods of segmenting brain structures that serve as barriers to the spread of brain cancers and structures to be spared from irradiation, for use in computer assisted target definition for glioma and radiotherapy plan optimization. The papers of the L2R challenge cover a wide spectrum of conventional and learning-based registration methods and often describe novel contributions. The main goal of the TN-SCUI challenge is to find automatic algorithms to accurately segment and classify the thyroid nodules in ultrasound images. *The challenges took place virtually due to the COVID-19 pandemic.
Segmentation of the Aorta. Towards the Automatic Segmentation, Modeling, and Meshing of the Aortic Vessel Tree from Multicenter Acquisition: First Challenge, SEG.A. 2023, Held in Conjunction with MICCAI 2023, Vancouver, BC, Canada, October 8, 2023, Proceedings (Lecture Notes in Computer Science #14539)
by Antonio Pepe Gian Marco Melito Jan EggerThis book constitutes the First Segmentation of the Aorta Challenge, SEG.A. 2023, which was held in conjunction with the 26th International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2023, on October 8, 2023. The 8 full and 3 short papers presented have been carefully reviewed and selected for inclusion in the book. They focus specifically on robustness, visual quality and meshing of automatically generated segmentations of aortic vessel trees from CT imaging. The challenge was organized as a ”container submission” challenge, where participants had to upload their algorithms to Grand Challenge in the form of Docker containers. Three tasks were created for SEG.A. 2023.
La seguridad informática es como el sexo seguro
by Sergio Yagüe-Pasamón Richard G Lowe JrProteja su ordenador, sus fotos y su información más valiosa sin salirse del presupuesto o tener que contratar a un experto. ¿Y que me diría si le digo que unos pocos hábitos innovadores podrían reducir las probabilidades de que un virus infecte su equipo o ser víctima de un pirata informático? Imagine cómo sería navegar por la web sin tener que preocuparse de los terroríficos fraudes relacionados con las tarjetas de crédito o el robo de identidad. ¿Y si pudiera mantener a los malos a raya con unas simples aplicaciones? El experto en seguridad y Ejecutivo informático, Richard Lowe, expone una serie de sencillos pasos que puede tomar para proteger su ordenador, sus fotos y sus datos de criminales y virus. Por medio de explicaciones sencillas y ejemplos fáciles de entender, Lowe explica por qué los piratas informáticos quieren su equipo, lo qué hacen con su información, y lo qué puede hacer para mantenerlos a raya. Lowe da respuesta a la pregunta: Cómo mantenerse a salvo en el lejano Oeste que es Internet. ¿Qué aprenderá al leer este libro? * ¿Qué demonios intentan hacer los piratas informáticos con su ordenador y sus datos? * Cómo proteger su ordenador de virus. * La mejor manera de mantener sus cuentas en línea a salvo de piratas maliciosos. * Cómo mantener sus datos y fotos a salvo del posible colapso de su ordenador y de todo tipo de catástrofes. * Cómo impedir que los intrusos utilicen su red inalámbrica para entrar por la fuerza en su ordenador. * Como protegerse cuando navegue por la red inalámbrica de su cafetería. * Cómo utilizar el ordenador de un hotel o un ordenador público de forma segura. * Cómo construir un cortafuegos alrededor de un ordenador para mantener a los delincuentes a raya. * Cómo proteger su ordenador de virus por medio de programas antivirus. * Cómo asegurar su red local. * Y muchos más consejos y técnicas para mantener sus datos, su dinero y su vida