Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Buy

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography.

Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard.

The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file.

There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche.

By reading this title readers will be provided with a step by step hands-on guide that includes:

  • Simple descriptions of actual threat scenarios
  • Simple, step-by-step instructions for securing data
  • How to use open source, time-proven and peer-reviewed cryptographic software
  • Easy to follow tips for safer computing
  • Unbiased and platform-independent coverage of encryption tools and techniques
  • Simple descriptions of actual threat scenarios
  • Simple, step-by-step instructions for securing data
  • How to use open source, time-proven and peer-reviewed cryptographic software
  • Easy-to-follow tips for safer computing
  • Unbiased and platform-independent coverage of encryption tools and techniques
(HTML tags aren't allowed.)

A+ Certification Training Kit
A+ Certification Training Kit
The A+ Certification program was created by a consortium of companies, including Microsoft, to define baseline knowledge and skill levels for IT professionals who support hardware and software based on the Intel platform. Fully updated to cover the latest operating systems, including Microsoft Windows(r) 2000, the A+ CERTIFICATION TRAINING KIT,...
Handbook of Engineering and Specialty Thermoplastics, Volume 3: Polyethers and Polyesters (Wiley-Scrivener)
Handbook of Engineering and Specialty Thermoplastics, Volume 3: Polyethers and Polyesters (Wiley-Scrivener)

The book summarizes many of the recent technical research accomplishments in the area of engineering polymers, such as oxygen containing main chain polymers (Polyether and Polyesters). The book emphasizes the various aspects of preparation, structure, processing, morphology, properties and applications of engineering polymers....

Ubuntu Certified Professional Study Guide (Exam LPI 199) (Book & CD Rom)
Ubuntu Certified Professional Study Guide (Exam LPI 199) (Book & CD Rom)
The Best Fully Integrated Study System Available for Exam LPI 199

With hundreds of practice questions and hands-on exercises, Ubuntu Certified Professional Study Guide covers what you need to know--and shows you how to prepare--for this challenging exam.

  • 100% complete coverage of all official...

Complete Guide to CISM Certification
Complete Guide to CISM Certification

Complete Guide to CISMВ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...

Technology Literacy Applications In Learning Environments
Technology Literacy Applications In Learning Environments
Technology Literacy Applications in Learning Environments presents readers with a view of technology literacy in a learning environment. While word processing skills are important, the development of technology skills covers the areas of presentation software, storage, human interaction, and virtual reality. Instructional technology is dedicated to...
Linux System Programming: Talking Directly to the Kernel and C Library
Linux System Programming: Talking Directly to the Kernel and C Library
This book is about writing software that makes the most effective use of the system you're running on -- code that interfaces directly with the kernel and core system libraries, including the shell, text editor, compiler, debugger, core utilities, and system daemons. The majority of both Unix and Linux code is still written at the system level, and...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy