Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/2155
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hassan, Nihad A. ; | en_US |
dc.contributor.author | Hijazi, Rami. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:35:58Z | - |
dc.date.available | 2020-05-17T08:35:58Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9781484227992 ; | en_US |
dc.identifier.isbn | 9781484227985 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/2155 | - |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | QA76 | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Printed edition: ; 9781484227985. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows. Digital Privacy and Security Using Windows offers a comprehensive list of practical digital privacy tutorials in addition to being a complete repository of free online resources and tools assembled in one place. The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird. What Youeell Learn: Know the various parties interested in having your private data Differentiate between government and corporate surveillance, and the motivations behind each one Understand how online tracking works technically Protect digital data, secure online communications, and become anonymous online Cover and destroy your digital traces using Windows OS Secure your data in transit and at rest Be aware of cyber security risks and countermeasures. ; | en_US |
dc.description.statementofresponsibility | by Nihad A. Hassan, Rami Hijazi. | en_US |
dc.description.tableofcontents | Chapter 1: Introduction and Discussion of the Current Status of Online Privacy -- Chapter 2: Essential Privacy Tips -- Chapter 3: Windows Security -- Chapter 4: Online Anonymity -- Chapter 5: Cryptography and Secure Communication -- Chapter 6: What's Next -- . ; | en_US |
dc.format.extent | XXIV, 284 p. 175 illus., 171 illus. in color. ; online resource. ; | en_US |
dc.publisher | Apress : | en_US |
dc.publisher | Imprint: Apress, | en_US |
dc.relation.haspart | 9781484227992.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Security. ; | en_US |
dc.title | Digital Privacy and Security Using Windows | en_US |
dc.title.alternative | A Practical Guide / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Berkeley, CA : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9781484227992.pdf | 10.06 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hassan, Nihad A. ; | en_US |
dc.contributor.author | Hijazi, Rami. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:35:58Z | - |
dc.date.available | 2020-05-17T08:35:58Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9781484227992 ; | en_US |
dc.identifier.isbn | 9781484227985 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/2155 | - |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | QA76 | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Printed edition: ; 9781484227985. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows. Digital Privacy and Security Using Windows offers a comprehensive list of practical digital privacy tutorials in addition to being a complete repository of free online resources and tools assembled in one place. The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird. What Youeell Learn: Know the various parties interested in having your private data Differentiate between government and corporate surveillance, and the motivations behind each one Understand how online tracking works technically Protect digital data, secure online communications, and become anonymous online Cover and destroy your digital traces using Windows OS Secure your data in transit and at rest Be aware of cyber security risks and countermeasures. ; | en_US |
dc.description.statementofresponsibility | by Nihad A. Hassan, Rami Hijazi. | en_US |
dc.description.tableofcontents | Chapter 1: Introduction and Discussion of the Current Status of Online Privacy -- Chapter 2: Essential Privacy Tips -- Chapter 3: Windows Security -- Chapter 4: Online Anonymity -- Chapter 5: Cryptography and Secure Communication -- Chapter 6: What's Next -- . ; | en_US |
dc.format.extent | XXIV, 284 p. 175 illus., 171 illus. in color. ; online resource. ; | en_US |
dc.publisher | Apress : | en_US |
dc.publisher | Imprint: Apress, | en_US |
dc.relation.haspart | 9781484227992.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Security. ; | en_US |
dc.title | Digital Privacy and Security Using Windows | en_US |
dc.title.alternative | A Practical Guide / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Berkeley, CA : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9781484227992.pdf | 10.06 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hassan, Nihad A. ; | en_US |
dc.contributor.author | Hijazi, Rami. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:35:58Z | - |
dc.date.available | 2020-05-17T08:35:58Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9781484227992 ; | en_US |
dc.identifier.isbn | 9781484227985 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/2155 | - |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | QA76 | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Printed edition: ; 9781484227985. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows. Digital Privacy and Security Using Windows offers a comprehensive list of practical digital privacy tutorials in addition to being a complete repository of free online resources and tools assembled in one place. The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird. What Youeell Learn: Know the various parties interested in having your private data Differentiate between government and corporate surveillance, and the motivations behind each one Understand how online tracking works technically Protect digital data, secure online communications, and become anonymous online Cover and destroy your digital traces using Windows OS Secure your data in transit and at rest Be aware of cyber security risks and countermeasures. ; | en_US |
dc.description.statementofresponsibility | by Nihad A. Hassan, Rami Hijazi. | en_US |
dc.description.tableofcontents | Chapter 1: Introduction and Discussion of the Current Status of Online Privacy -- Chapter 2: Essential Privacy Tips -- Chapter 3: Windows Security -- Chapter 4: Online Anonymity -- Chapter 5: Cryptography and Secure Communication -- Chapter 6: What's Next -- . ; | en_US |
dc.format.extent | XXIV, 284 p. 175 illus., 171 illus. in color. ; online resource. ; | en_US |
dc.publisher | Apress : | en_US |
dc.publisher | Imprint: Apress, | en_US |
dc.relation.haspart | 9781484227992.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Security. ; | en_US |
dc.title | Digital Privacy and Security Using Windows | en_US |
dc.title.alternative | A Practical Guide / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Berkeley, CA : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9781484227992.pdf | 10.06 MB | Adobe PDF | Preview File |