Desktop Witness
The Do′s and Don′ts of Personal Computer Security
Seiten
2002
John Wiley & Sons Ltd (Verlag)
978-0-471-48657-2 (ISBN)
John Wiley & Sons Ltd (Verlag)
978-0-471-48657-2 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Most computer users are ignorant of the tracks, trails, and traces they leave behind when they use their computer. This book details the ways in which computer and online privacy can be compromised and gives practical guidance on how to prevent private information from being accessible or retrievable by outside parties or agencies.
Are you aware of every track, trail, and trace you leave behind every time you use your PC? Are you sure that you really deleted that confidential information from your hard drive? If not - read this. This book describes the ways in which computer and online privacy can be compromised and gives practical guidance on how to prevent private information from being accessible or retrievable by outside parties or agencies. This book covers: The types of information which are retrievable from a computer and how to prevent leaving sensitive data behind How privacy is compromised on the internet (email, web browsing, profiling) and how to combat it Full technical details on software for doing computer forensics, defeating computer forensics, encryption, steganography, keystroke capture and detecting keystroke capture
Are you aware of every track, trail, and trace you leave behind every time you use your PC? Are you sure that you really deleted that confidential information from your hard drive? If not - read this. This book describes the ways in which computer and online privacy can be compromised and gives practical guidance on how to prevent private information from being accessible or retrievable by outside parties or agencies. This book covers: The types of information which are retrievable from a computer and how to prevent leaving sensitive data behind How privacy is compromised on the internet (email, web browsing, profiling) and how to combat it Full technical details on software for doing computer forensics, defeating computer forensics, encryption, steganography, keystroke capture and detecting keystroke capture
MICHAEL A. CALOYANNIDES is a Senior Fellow at Mitretek Systems,Virginia, USA. He is an expert in the fields of information assurance, network security, computer forensics and other related security areas.
Preface Acknowledgment The Need is Very Real: Author s Perspective So You Want to Encrypt: Don t Hurt Your Own Interests by Doing So Protect What and From Whom? The Answer Determines What You Should and Should Not Do Effective Protection for Computers Not Connected to Networks Effective Protection for Computers Connected to the Internet or other Networks Encrypted TelephonyLegal Issues In ConclusionAppendicesGlossary Index
Erscheint lt. Verlag | 26.4.2002 |
---|---|
Verlagsort | Chichester |
Sprache | englisch |
Maße | 188 x 235 mm |
Gewicht | 690 g |
Einbandart | Paperback |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-471-48657-4 / 0471486574 |
ISBN-13 | 978-0-471-48657-2 / 9780471486572 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …
Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99 €
Management der Informationssicherheit und Vorbereitung auf die …
Buch (2024)
Carl Hanser (Verlag)
69,99 €