Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/2155
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHassan, Nihad A. ;en_US
dc.contributor.authorHijazi, Rami. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:35:58Z-
dc.date.available2020-05-17T08:35:58Z-
dc.date.issued2017en_US
dc.identifier.isbn9781484227992 ;en_US
dc.identifier.isbn9781484227985 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/2155-
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionQA76en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9781484227985. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractUse this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows. Digital Privacy and Security Using Windows offers a comprehensive list of practical digital privacy tutorials in addition to being a complete repository of free online resources and tools assembled in one place. The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird. What Youeell Learn: Know the various parties interested in having your private data Differentiate between government and corporate surveillance, and the motivations behind each one Understand how online tracking works technically Protect digital data, secure online communications, and become anonymous online Cover and destroy your digital traces using Windows OS Secure your data in transit and at rest Be aware of cyber security risks and countermeasures. ;en_US
dc.description.statementofresponsibilityby Nihad A. Hassan, Rami Hijazi.en_US
dc.description.tableofcontentsChapter 1: Introduction and Discussion of the Current Status of Online Privacy -- Chapter 2: Essential Privacy Tips -- Chapter 3: Windows Security -- Chapter 4: Online Anonymity -- Chapter 5: Cryptography and Secure Communication -- Chapter 6: What's Next -- . ;en_US
dc.format.extentXXIV, 284 p. 175 illus., 171 illus. in color. ; online resource. ;en_US
dc.publisherApress :en_US
dc.publisherImprint: Apress,en_US
dc.relation.haspart9781484227992.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Scienceen_US
dc.subjectSecurity. ;en_US
dc.titleDigital Privacy and Security Using Windowsen_US
dc.title.alternativeA Practical Guide /en_US
dc.typeBooken_US
dc.publisher.placeBerkeley, CA :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9781484227992.pdf10.06 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHassan, Nihad A. ;en_US
dc.contributor.authorHijazi, Rami. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:35:58Z-
dc.date.available2020-05-17T08:35:58Z-
dc.date.issued2017en_US
dc.identifier.isbn9781484227992 ;en_US
dc.identifier.isbn9781484227985 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/2155-
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionQA76en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9781484227985. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractUse this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows. Digital Privacy and Security Using Windows offers a comprehensive list of practical digital privacy tutorials in addition to being a complete repository of free online resources and tools assembled in one place. The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird. What Youeell Learn: Know the various parties interested in having your private data Differentiate between government and corporate surveillance, and the motivations behind each one Understand how online tracking works technically Protect digital data, secure online communications, and become anonymous online Cover and destroy your digital traces using Windows OS Secure your data in transit and at rest Be aware of cyber security risks and countermeasures. ;en_US
dc.description.statementofresponsibilityby Nihad A. Hassan, Rami Hijazi.en_US
dc.description.tableofcontentsChapter 1: Introduction and Discussion of the Current Status of Online Privacy -- Chapter 2: Essential Privacy Tips -- Chapter 3: Windows Security -- Chapter 4: Online Anonymity -- Chapter 5: Cryptography and Secure Communication -- Chapter 6: What's Next -- . ;en_US
dc.format.extentXXIV, 284 p. 175 illus., 171 illus. in color. ; online resource. ;en_US
dc.publisherApress :en_US
dc.publisherImprint: Apress,en_US
dc.relation.haspart9781484227992.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Scienceen_US
dc.subjectSecurity. ;en_US
dc.titleDigital Privacy and Security Using Windowsen_US
dc.title.alternativeA Practical Guide /en_US
dc.typeBooken_US
dc.publisher.placeBerkeley, CA :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9781484227992.pdf10.06 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHassan, Nihad A. ;en_US
dc.contributor.authorHijazi, Rami. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:35:58Z-
dc.date.available2020-05-17T08:35:58Z-
dc.date.issued2017en_US
dc.identifier.isbn9781484227992 ;en_US
dc.identifier.isbn9781484227985 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/2155-
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionQA76en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9781484227985. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractUse this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows. Digital Privacy and Security Using Windows offers a comprehensive list of practical digital privacy tutorials in addition to being a complete repository of free online resources and tools assembled in one place. The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird. What Youeell Learn: Know the various parties interested in having your private data Differentiate between government and corporate surveillance, and the motivations behind each one Understand how online tracking works technically Protect digital data, secure online communications, and become anonymous online Cover and destroy your digital traces using Windows OS Secure your data in transit and at rest Be aware of cyber security risks and countermeasures. ;en_US
dc.description.statementofresponsibilityby Nihad A. Hassan, Rami Hijazi.en_US
dc.description.tableofcontentsChapter 1: Introduction and Discussion of the Current Status of Online Privacy -- Chapter 2: Essential Privacy Tips -- Chapter 3: Windows Security -- Chapter 4: Online Anonymity -- Chapter 5: Cryptography and Secure Communication -- Chapter 6: What's Next -- . ;en_US
dc.format.extentXXIV, 284 p. 175 illus., 171 illus. in color. ; online resource. ;en_US
dc.publisherApress :en_US
dc.publisherImprint: Apress,en_US
dc.relation.haspart9781484227992.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Scienceen_US
dc.subjectSecurity. ;en_US
dc.titleDigital Privacy and Security Using Windowsen_US
dc.title.alternativeA Practical Guide /en_US
dc.typeBooken_US
dc.publisher.placeBerkeley, CA :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9781484227992.pdf10.06 MBAdobe PDFThumbnail
Preview File