This chapter is exactly what the title suggests. It provides a succinct listing of things that you should protect. It also closes with five tips that you should keep in mind when confronted with cyber-scams that are common used online.
CITATION STYLE
Pelton, J. N., & Singh, I. B. (2015). Ten Key Things to Protect. In Digital Defense (pp. 67–81). Springer International Publishing. https://doi.org/10.1007/978-3-319-19953-5_4
Mendeley helps you to discover research relevant for your work.