Digital privacy and security using windows : a practical guide / Nihad A. Hassan, Rami Hijazi.
By: Hassan, Nihad A [author.].
Contributor(s): Hijazi, Rami [author.] | Ohio Library and Information Network.
Publisher: [New York, NY] : Apress, 2017Description: 284 pages.Content type: text Media type: computer Carrier type: online resourceISBN: 9781484227985.Subject(s): Microsoft Windows (Computer file) | Computer security | Virtual computer systems | Data recovery (Computer science)Genre/Form: Print books.Current location | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|
On Shelf | QA76.76 .O63 2017 (Browse shelf) | Available | AU00000000010716 |
Browsing Alfaisal University Shelves , Shelving location: On Shelf Close shelf browser
QA76.76 .M54 E89 2017 Introduction to middleware : web services, object components, and cloud computing / | QA76.76.O62 T69 2017 For fun and profit : a history of the free and open source software revolution / | QA76.76 .O63 2017 Comptia cybersecurity analyst (csa+) study guide exam cs0-001 / | QA76.76 .O63 2017 Digital privacy and security using windows : a practical guide / | QA76.76 .O63 2018 UNIX and Linux system administration handbook / | QA76.76.O63 J33 2017 Android apps for absolute beginners / | QA76.76 .O63 S5556 2019 The Linux command line : a complete introduction / |
Includes bibliographical references and index.
Introduction to the current status of online privacy -- Essential privacy tips -- Windows security -- Online anonymity -- Cryptography and secure communication -- What's next?
Available to OhioLINK libraries.
"This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint... The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird."--Page 4 of cover.