The Complete Guide to e-Security
Paladin Press,U.S. (Verlag)
978-1-58160-105-3 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Want to take advantage of the latest technology without being taken advantage of? In this eye-opening guide, Michael Chesbro shows how the average American's personal and business e-mail can be read in more than a dozen places between the time it is sent and the time it is received, how marketers and other snoops can find out which websites you visit (not to mention such private information as your IP address, e-mail address, geological location, and the type of computer you are using), and how the government is working toward limiting your right to use encryption. Chesbro then tells you everything you need to know about safely and anonymously surfing the Internet, setting-up encrypted e-mail easily, creating an uncrackable password, understanding unbreakable encryption programs such as PGP (Pretty Good Privacy), sending e-mail through re-mailer services to disguise the source and securely deleting or hiding files on your home computer to safeguard your private records from seizure.
Michael Chesbro is a senior counterintelligence agent with the U.S. Department of Defense. He holds degrees in security management, paralegal studies, and jurisprudence, and is a graduate of the Federal Law Enforcement Training Center. He is professionally certified as a protection officer and as a security supervisor by the International Foundation for Protection Officers. He is a board-certified forensic examiner and a fellow of the American College of Forensic Examiners, as well as a diplomate of the American Board of Forensic Examiners and the American Board of Law Enforcement Experts.
Chapter 1 - The Need for Private Communication Chapter 2 - Understanding E-Mail and the Internet Internet Protocol E-Mail Traps Trace Route Effective Use of Passwords Junk E-Mail, Pornography, and Spam Anonymous Web-Browsing Online People Finders Chapter 3 - Free E-Mail Services HushMail SAFe-mail ZipLip Unencrypted Web-Based E-Mail Juno Chapter 4 - Remailers Chapter 5 - Understanding Encryption Chapter 6 - PGP and Digital Certificates Chapter 7 - One-Time Pads Chapter 8 - Encryption Programs Norton Secret Stuff Security Box Two Fish Life-with Key Generator Passwords and Encryption Built into Other Software Steganography Chapter 9 - Securely Deleting of Hiding Files Chapter 10 - Communications Planning Chapter 11 - Online Communications and the Law Privacy in the E-World and the Physical World Chapter 12 - A Final Word Appendix I FBI Statement on Encryption Appendix II Online Security and Privacy Resources Appendix III Title 18 United States Code Sections 2701-2711 Bibliography
Verlagsort | Colorado |
---|---|
Sprache | englisch |
Maße | 155 x 230 mm |
Gewicht | 235 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
Mathematik / Informatik ► Informatik ► Web / Internet | |
ISBN-10 | 1-58160-105-0 / 1581601050 |
ISBN-13 | 978-1-58160-105-3 / 9781581601053 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich