home
cyber security books
internet security fundamentals
0 preface
1 introduction
2 viruses & trojans
3 vulnerabilities & security flaws
4 online scams
5 a question of trust
6 greed
7 porn
8 phishing - part1
8 phishing - part2
9 fake antivirus
10 email
11 online privacy
12 illegal software
13 smartphones & tablets
14 eBay & PayPal
15 unofficial websites
16 social media
17 online gambling
18 instant messaging services
19 fake games
20 ecards
21 fake jobs
22 online dating
23 cryptomining
24 generative AI
25 formjacking
26 ransomware
27 using a shared computer
28 using shared wifi
29 flash & java
30 removing a virus
31 passwords
32 data breaches
33 alternative operating systems
34 internet routers
35 parental control software
36 backups
37 typos & deceptive fonts
38 file transfer services
39 spam (junk email)
40 two-factor authentication
41 user admin accounts
42 internet of things
43 malvertising
44 unsupported software
45 in conclusion
46 checklist of things to do
47 useful resources
48 glossary
49 author's note
data protection & GDPR resources
cyber security
IT asset management
useful Videos
glossary
blog posts
security solutions
security training
public speaking
office 365 security
block emails by domain
free security resources
free IT resources
affiliates
about me
Boolean Logical
Scroll to top