Digital Privacy and Security Using Windows: A Practical Guide
Autor Nihad Hassan, Rami Hijazien Limba Engleză Paperback – 4 iul 2017
This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows.
Digital Privacy and Security Using Windows offers a comprehensive list of practical digital privacy tutorials in addition to being a complete repository of free online resources and tools assembled in one place. The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird.
What You’ll Learn
- Know the various parties interested in having your private data
- Differentiate between government and corporate surveillance, and the motivations behind each one
- Understand how online tracking works technically
- Protect digital data, secure online communications, and become anonymous online
- Cover and destroy your digital traces using Windows OS
- Secure your data in transit and at rest
- Be aware of cyber security risks and countermeasures
End users, information security professionals, management, infosec students
Preț: 527.19 lei
Preț vechi: 658.99 lei
-20% Nou
Puncte Express: 791
Preț estimativ în valută:
100.90€ • 106.44$ • 84.08£
100.90€ • 106.44$ • 84.08£
Carte disponibilă
Livrare economică 12-26 decembrie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781484227985
ISBN-10: 1484227980
Pagini: 284
Ilustrații: XXIV, 284 p. 175 illus., 171 illus. in color.
Dimensiuni: 178 x 254 x 25 mm
Greutate: 5.89 kg
Ediția:1st ed.
Editura: Apress
Colecția Apress
Locul publicării:Berkeley, CA, United States
ISBN-10: 1484227980
Pagini: 284
Ilustrații: XXIV, 284 p. 175 illus., 171 illus. in color.
Dimensiuni: 178 x 254 x 25 mm
Greutate: 5.89 kg
Ediția:1st ed.
Editura: Apress
Colecția Apress
Locul publicării:Berkeley, CA, United States
Cuprins
Chapter 1: Introduction and Discussion of the Current Status of Online Privacy.- Chapter 2: Essential Privacy Tips.- Chapter 3: Windows Security.- Chapter 4: Online Anonymity.- Chapter 5: Cryptography and Secure Communication.- Chapter 6: What's Next.-
Notă biografică
Nihad A. Hassan is an independent information security consultant, digital forensics and cybersecurity expert, online blogger, and book author. He has been actively conducting research on different areas of information security for more than a decade and has developed numerous cybersecurity education courses and technical guides.
Nihad focuses on computer forensics and anti-forensics techniques in Windows OS. He has completed numerous technical security consulting engagements involving security architectures, penetration testing, computer crime investigation, and anti-forensics techniques. Recently, he has shifted his focus toward digital privacy and security.
Nihad has authored two books and scores of information security articles in various global publications. He also enjoys being involved in security training, education, and motivation. His current work focuses on digital forensics, anti-forensics techniques, digital privacy, and web security assessment. He covers different information security topics and related matters on his "DarknessGate" infosec blog. Nihad has a BSc honors degree in computer science from the University of Greenwich, United Kingdom.Rami Hijazi is the General Manager of MERICLER Inc., an education and corporate training firm in Toronto, Canada. He is an experienced IT professional who lectures on a wide array of topics, including object-oriented programming, Java, eCommerce, Agile development, database design, and data handling analysis. Rami also works as consultant to Cyber Boundaries Inc. where he is involved in the design of encryption systems and wireless networks, intrusion detection and data breach tracking, as well as planning and development advice for IT departments concerning contingency planning.
Nihad focuses on computer forensics and anti-forensics techniques in Windows OS. He has completed numerous technical security consulting engagements involving security architectures, penetration testing, computer crime investigation, and anti-forensics techniques. Recently, he has shifted his focus toward digital privacy and security.
Nihad has authored two books and scores of information security articles in various global publications. He also enjoys being involved in security training, education, and motivation. His current work focuses on digital forensics, anti-forensics techniques, digital privacy, and web security assessment. He covers different information security topics and related matters on his "DarknessGate" infosec blog. Nihad has a BSc honors degree in computer science from the University of Greenwich, United Kingdom.Rami Hijazi is the General Manager of MERICLER Inc., an education and corporate training firm in Toronto, Canada. He is an experienced IT professional who lectures on a wide array of topics, including object-oriented programming, Java, eCommerce, Agile development, database design, and data handling analysis. Rami also works as consultant to Cyber Boundaries Inc. where he is involved in the design of encryption systems and wireless networks, intrusion detection and data breach tracking, as well as planning and development advice for IT departments concerning contingency planning.
Textul de pe ultima copertă
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.
This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows.
Digital Privacy and Security Using Windows offers a comprehensive list of practical digital privacy tutorials in addition to being a complete repository of free online resources and tools assembled in one place. The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird.
What You’ll Learn:
This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows.
Digital Privacy and Security Using Windows offers a comprehensive list of practical digital privacy tutorials in addition to being a complete repository of free online resources and tools assembled in one place. The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird.
What You’ll Learn:
- Know the various parties interested in having your private data
- Differentiate between government and corporate surveillance, and the motivations behind each one
- Understand how online tracking works technically
- Protect digital data, secure online communications, and become anonymous online
- Cover and destroy your digital traces using Windows OS
- Secure your data in transit and at rest
- Be aware of cyber security risks and countermeasures
Caracteristici
Practical book that teaches you how to use a wide range of digital privacy methods as well as encryption and anonymity tools Covers types of threats, how to mitigate/handle them, and advice and best practices Examines the popular Windows operating system