Digital Privacy and Security Using Windows

Digital Privacy and Security Using Windows
Author :
Publisher : Apress
Total Pages : 302
Release :
ISBN-10 : 9781484227992
ISBN-13 : 1484227999
Rating : 4/5 (999 Downloads)

Book Synopsis Digital Privacy and Security Using Windows by : Nihad Hassan

Download or read book Digital Privacy and Security Using Windows written by Nihad Hassan and published by Apress. This book was released on 2017-07-02 with total page 302 pages. Available in PDF, EPUB and Kindle. Book excerpt: Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows. Digital Privacy and Security Using Windows offers a comprehensive list of practical digital privacy tutorials in addition to being a complete repository of free online resources and tools assembled in one place. The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird. What You’ll Learn Know the various parties interested in having your private data Differentiate between government and corporate surveillance, and the motivations behind each one Understand how online tracking works technically Protect digital data, secure online communications, and become anonymous online Cover and destroy your digital traces using Windows OS Secure your data in transit and at rest Be aware of cyber security risks and countermeasures Who This Book Is For End users, information security professionals, management, infosec students


Digital Privacy and Security Using Windows Related Books

Digital Privacy and Security Using Windows
Language: en
Pages: 302
Authors: Nihad Hassan
Categories: Computers
Type: BOOK - Published: 2017-07-02 - Publisher: Apress

DOWNLOAD EBOOK

Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your comm
Internet Privacy For Dummies
Language: en
Pages: 390
Authors: John R. Levine
Categories: Computers
Type: BOOK - Published: 2002-08-01 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

* Covers the essentials: An individual Internet user needs to know to help maintain personal privacy. Topics include securing a PC and Internet connection, know
Everything You Need to Know About Digital Privacy
Language: en
Pages: 66
Authors: Colin Wilkinson
Categories: Juvenile Nonfiction
Type: BOOK - Published: 2017-07-15 - Publisher: The Rosen Publishing Group, Inc

DOWNLOAD EBOOK

Privacy invasion, cyberbullying, and identity theft are vulnerabilities that young people expose themselves to every time they go online. This book explains wha
Everything You Need to Know About Digital Privacy
Language: en
Pages: 66
Authors: Colin Wilkinson
Categories: Juvenile Nonfiction
Type: BOOK - Published: 2017-07-15 - Publisher: The Rosen Publishing Group, Inc

DOWNLOAD EBOOK

Privacy invasion, cyberbullying, and identity theft are vulnerabilities that young people expose themselves to every time they go online. This book explains wha
The Basics of Digital Privacy
Language: en
Pages: 152
Authors: Denny Cherry
Categories: Computers
Type: BOOK - Published: 2013-11-21 - Publisher: Syngress

DOWNLOAD EBOOK

Who’s watching you online? These days, it’s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identit