Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately-WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard. The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file. There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche. By reading this title readers will be provided with a ste
"Sinopsis" puede pertenecer a otra edición de este libro.
Pete Loshin writes and consults about Internet protocols and open source network technologies. Formerly on staff at BYTE Magazine, Information Security Magazine and other publications, his work appears regularly in leading trade publications and websites including CPU, Computerworld, PC Magazine, EarthWeb, Internet.com, and CNN.
Pete Loshin, Independent Consultant
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 17,81 gastos de envío desde Reino Unido a España
Destinos, gastos y plazos de envíoEUR 5,55 gastos de envío desde Reino Unido a España
Destinos, gastos y plazos de envíoLibrería: THE SAINT BOOKSTORE, Southport, Reino Unido
Paperback / softback. Condición: New. New copy - Usually dispatched within 4 working days. 212. Nº de ref. del artículo: B9780124114838
Cantidad disponible: Más de 20 disponibles
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware Englisch. Nº de ref. del artículo: 9780124114838
Cantidad disponible: 2 disponibles
Librería: Revaluation Books, Exeter, Reino Unido
Paperback. Condición: Brand New. 86 pages. 8.75x5.75x0.25 inches. In Stock. Nº de ref. del artículo: __0124114830
Cantidad disponible: 2 disponibles
Librería: Ria Christie Collections, Uxbridge, Reino Unido
Condición: New. In. Nº de ref. del artículo: ria9780124114838_new
Cantidad disponible: Más de 20 disponibles
Librería: Chiron Media, Wallingford, Reino Unido
Paperback. Condición: New. Nº de ref. del artículo: 6666-ELS-9780124114838
Cantidad disponible: Más de 20 disponibles
Librería: Majestic Books, Hounslow, Reino Unido
Condición: New. pp. 114 23:B&W 6 x 9 in or 229 x 152 mm Perfect Bound on White w/Gloss Lam. Nº de ref. del artículo: 57110274
Cantidad disponible: 3 disponibles
Librería: Books Puddle, New York, NY, Estados Unidos de America
Condición: New. pp. 114. Nº de ref. del artículo: 2651433693
Cantidad disponible: 3 disponibles
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
Paperback / softback. Condición: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 212. Nº de ref. del artículo: C9780124114838
Cantidad disponible: Más de 20 disponibles
Librería: moluna, Greven, Alemania
Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Data encryption is a powerful tool, if used properly. This title provides with a step by step hands-on guide that includes: simple descriptions of actual threat scenarios simple, step-by-step instructions for securing data how to use open source, time-pro. Nº de ref. del artículo: 5891626
Cantidad disponible: Más de 20 disponibles
Librería: Chiron Media, Wallingford, Reino Unido
Paperback. Condición: New. Nº de ref. del artículo: 6666-IUK-9780124114838
Cantidad disponible: 10 disponibles