The Complete Guide to e-Security - Michael Chesbro

The Complete Guide to e-Security

Using the Internet and e-Mail without Losing Your Privacy

(Autor)

Buch | Softcover
150 Seiten
2000
Paladin Press,U.S. (Verlag)
978-1-58160-105-3 (ISBN)
26,40 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
This work shows how the average American's personal and business e-mail can be read in more than a dozen places between the time it's sent and the time it's received. The author advises on you need to know about safely and anonymously surfing the Internet.
Want to take advantage of the latest technology without being taken advantage of? In this eye-opening guide, Michael Chesbro shows how the average American's personal and business e-mail can be read in more than a dozen places between the time it is sent and the time it is received, how marketers and other snoops can find out which websites you visit (not to mention such private information as your IP address, e-mail address, geological location, and the type of computer you are using), and how the government is working toward limiting your right to use encryption. Chesbro then tells you everything you need to know about safely and anonymously surfing the Internet, setting-up encrypted e-mail easily, creating an uncrackable password, understanding unbreakable encryption programs such as PGP (Pretty Good Privacy), sending e-mail through re-mailer services to disguise the source and securely deleting or hiding files on your home computer to safeguard your private records from seizure.

Michael Chesbro is a senior counterintelligence agent with the U.S. Department of Defense. He holds degrees in security management, paralegal studies, and jurisprudence, and is a graduate of the Federal Law Enforcement Training Center. He is professionally certified as a protection officer and as a security supervisor by the International Foundation for Protection Officers. He is a board-certified forensic examiner and a fellow of the American College of Forensic Examiners, as well as a diplomate of the American Board of Forensic Examiners and the American Board of Law Enforcement Experts.

Chapter 1 - The Need for Private Communication Chapter 2 - Understanding E-Mail and the Internet Internet Protocol E-Mail Traps Trace Route Effective Use of Passwords Junk E-Mail, Pornography, and Spam Anonymous Web-Browsing Online People Finders Chapter 3 - Free E-Mail Services HushMail SAFe-mail ZipLip Unencrypted Web-Based E-Mail Juno Chapter 4 - Remailers Chapter 5 - Understanding Encryption Chapter 6 - PGP and Digital Certificates Chapter 7 - One-Time Pads Chapter 8 - Encryption Programs Norton Secret Stuff Security Box Two Fish Life-with Key Generator Passwords and Encryption Built into Other Software Steganography Chapter 9 - Securely Deleting of Hiding Files Chapter 10 - Communications Planning Chapter 11 - Online Communications and the Law Privacy in the E-World and the Physical World Chapter 12 - A Final Word Appendix I FBI Statement on Encryption Appendix II Online Security and Privacy Resources Appendix III Title 18 United States Code Sections 2701-2711 Bibliography

Verlagsort Colorado
Sprache englisch
Maße 155 x 230 mm
Gewicht 235 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Mathematik / Informatik Informatik Web / Internet
ISBN-10 1-58160-105-0 / 1581601050
ISBN-13 978-1-58160-105-3 / 9781581601053
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00