Computer & Internet Security: A Hands-on Approach (2nd Edition)

Spread the love
AuthorsWenliang Du


In an era driven by technology and connectivity, the importance of computer and internet security cannot be overstated. With the proliferation of digital devices and the increasing dependence on the internet for various aspects of our lives, the need for a comprehensive understanding of security practices has become paramount. The second edition of Computer & Internet Security: A Hands-on Approach comes at a critical juncture, offering readers an updated and practical guide to safeguarding their digital world.

Chapter 1: The Evolving Threat Landscape

The first chapter of the second edition delves into the ever-evolving threat landscape of computer and internet security. It highlights how cybercriminals have become more sophisticated in their attacks, targeting individuals, businesses, and even governments. The chapter underscores the importance of understanding the motives behind these attacks and how they have evolved over time. Readers are introduced to the concept of “threat vectors” – the various ways through which attackers can compromise a system – and are encouraged to adopt a proactive approach to security.

Chapter 2: Fundamentals of Encryption

Encryption lies at the heart of modern computer and internet security. This chapter takes readers on a deep dive into the fundamentals of encryption, explaining how it works to protect data from unauthorized access. The concept of encryption keys, both symmetric and asymmetric, is elucidated, along with their respective applications. The chapter also introduces the concept of end-to-end encryption and its significance in securing communication and data exchange.

Chapter 3: Securing Personal Devices

As personal devices such as smartphones, tablets, and laptops become extensions of our lives, securing them is of utmost importance. Chapter 3 walks readers through practical steps to secure their personal devices, including setting up strong passwords, enabling two-factor authentication, and regularly updating software. The chapter emphasizes the significance of device hygiene and the potential risks associated with public Wi-Fi networks.

Chapter 4: Navigating the Perils of Social Engineering

Social engineering has emerged as one of the most deceptive and effective strategies employed by cybercriminals. This chapter sheds light on the psychology behind social engineering attacks and provides readers with real-world examples. Through hands-on exercises, readers can develop the skills to recognize and resist phishing emails, phone scams, and other manipulation tactics.

Chapter 5: Safeguarding Online Privacy

With the continuous collection of personal data by online platforms, preserving online privacy has become a critical concern. Chapter 5 discusses the various methods by which users can safeguard their online privacy, such as using virtual private networks (VPNs), employing browser privacy settings, and being mindful of the data shared on social media platforms. The chapter emphasizes the need for a proactive and vigilant approach to protect sensitive information.

Chapter 6: Building a Robust Home Network

The home network serves as the foundation of digital connectivity, making it a prime target for cyber attacks. This chapter provides readers with a hands-on approach to securing their home networks. It covers topics such as configuring firewalls, setting up intrusion detection systems, and managing connected IoT devices securely. By following the practical guidelines outlined in this chapter, readers can establish a robust and well-protected home network environment.

Chapter 7: Exploring Cryptocurrencies and Blockchain Security

The rise of cryptocurrencies has brought forth new challenges and opportunities in the realm of security. Chapter 7 delves into the security considerations surrounding cryptocurrencies and blockchain technology. Readers are introduced to the concepts of digital wallets, private keys, and the importance of securing their crypto assets. Additionally, the chapter explores the role of blockchain in enhancing security and transparency in various industries.

Chapter 8: Business and Enterprise Security

Modern businesses operate in a digital landscape, making them susceptible to a wide range of cyber threats. Chapter 8 focuses on business and enterprise security, addressing the unique challenges organizations face. It covers topics such as employee training, incident response planning, and securing sensitive corporate data. By adopting a comprehensive and proactive security strategy, businesses can mitigate risks and ensure continuity in the face of cyber attacks.


Computer & Internet Security: A Hands-on Approach (2nd Edition) provides readers with a comprehensive and practical guide to navigating the complex world of digital security. Through a hands-on approach, readers are equipped with the knowledge and skills necessary to safeguard their personal devices, online presence, and digital assets. As the threat landscape continues to evolve, this edition serves as an invaluable resource for individuals, businesses, and anyone seeking to fortify their digital defenses and embrace a secure and resilient digital future.

What do you think?

688 Points
Upvote Downvote

Written by Jordan Farrell

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Complex Variables and Applications (9th edition)

Gateways to Art Understanding the Visual Arts (3rd Edition)