Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Buy

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography.

Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard.

The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file.

There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche.

By reading this title readers will be provided with a step by step hands-on guide that includes:

  • Simple descriptions of actual threat scenarios
  • Simple, step-by-step instructions for securing data
  • How to use open source, time-proven and peer-reviewed cryptographic software
  • Easy to follow tips for safer computing
  • Unbiased and platform-independent coverage of encryption tools and techniques
  • Simple descriptions of actual threat scenarios
  • Simple, step-by-step instructions for securing data
  • How to use open source, time-proven and peer-reviewed cryptographic software
  • Easy-to-follow tips for safer computing
  • Unbiased and platform-independent coverage of encryption tools and techniques
(HTML tags aren't allowed.)

Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software
Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software

Understand the big picture of the software development process. We use software every day – operating systems, applications, document editing programs, home banking – but have you ever wondered who creates software and how it’s created? This book guides you through the entire process, from conception to the finished...

Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology)
Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology)
Wireless networking is poised to have a massive impact on communications, and the 802.11 standard is to wireless networking what Ethernet is to wired networking. There are already over 50 million devices using the dominant IEEE 802.11 (essentially wireless Ethernet) standard, with astronomical growth predicted over the next 10 years. New...
OS X Mavericks For Dummies
OS X Mavericks For Dummies

Coast through OS X Mavericks with help from Dr. Mac and For Dummies

Ready to make friends with Mavericks? Then, Dr. Mac’s your man. Author and longtime Mac guru, Bob “Dr. Mac” LeVitus shares his witty insights and helpful tips in this full-color update to his bestselling OS X guide. You’ll...


Metaprogramming Ruby
Metaprogramming Ruby

Ruby inherits characteristics from various languages—Lisp, Smalltalk, C, and Perl, to name a few. Metaprogramming comes from Lisp (and Smalltalk). It’s a bit like magic, which makes something astonishing possible. There are two kinds of magic: white magic, which does good things, and black magic, which can do nasty things. Likewise,...

The Microsoft Certified Application Specialist Study Guide
The Microsoft Certified Application Specialist Study Guide
Demonstrate your expertise with the 2007 Microsoft Office system! This comprehensive study guide covers all the Microsoft Certified Application Specialist exams for Microsoft Office, including Word 2007, Excel 2007, Outlook 2007, PowerPoint 2007, and Access 2007. For each exam, you ll build the skills and knowledge measured by its objectives...
Oracle DBA Guide to Data Warehousing and Star Schemas
Oracle DBA Guide to Data Warehousing and Star Schemas

Oracle DBAs finally have a definitive guide to every aspect of designing, constructing, tuning, and maintaining star schema data warehouses with Oracle 8i and 9i. Bert Scalzo, one of the world's leading Oracle data warehousing experts, offers practical, hard-won lessons and breakthrough techniques for maximizing performance,...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy