Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Buy

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography.

Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard.

The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file.

There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche.

By reading this title readers will be provided with a step by step hands-on guide that includes:

  • Simple descriptions of actual threat scenarios
  • Simple, step-by-step instructions for securing data
  • How to use open source, time-proven and peer-reviewed cryptographic software
  • Easy to follow tips for safer computing
  • Unbiased and platform-independent coverage of encryption tools and techniques
  • Simple descriptions of actual threat scenarios
  • Simple, step-by-step instructions for securing data
  • How to use open source, time-proven and peer-reviewed cryptographic software
  • Easy-to-follow tips for safer computing
  • Unbiased and platform-independent coverage of encryption tools and techniques
(HTML tags aren't allowed.)

The Holy Grail of Network Storage Management
The Holy Grail of Network Storage Management
The Holy Grail of Network Storage Management, by noted IT veteran and author Jon William Toigo, is a comprehensive, vendor-neutral guide to networked storage management. The book gives consumers straight information on the business value of current products and technologies, and describes how to make informed...
Managing Information Technology Projects: Applying Project Management Strategies to Software, Hardware, and Integration Initiatives
Managing Information Technology Projects: Applying Project Management Strategies to Software, Hardware, and Integration Initiatives

With software and hardware development techniques improving constantly, it’s surprising to learn that more than half of all technology projects overrun their schedules and budgets by 200 percent or more. Computerworld magazine recently reported several surveys showing that project failure is overwhelmingly traceable to poorly...

Core and Metro Networks
Core and Metro Networks

It is commonly accepted today that optical fiber communications have revolutionized telecommunications. Indeed, dramatic changes have been induced in the way we interact with our relatives, friends, and colleagues: we retrieve information, we entertain and educate ourselves, we buy and sell, we organize our activities, and so on, in a long...


Quantum Wells, Wires and Dots: Theoretical and Computational Physics of Semiconductor Nanostructures
Quantum Wells, Wires and Dots: Theoretical and Computational Physics of Semiconductor Nanostructures
This book is aimed at providing all of the essential information, both theoretical and computational, in order that the reader can, starting from essentially nothing, understand how the electronic, optical and transport properties of semiconductor heterostructures are calculated. However, perhaps more importantly, starting from this low...
Organic Electronics in Sensors and Biotechnology (Mc-Graw-Hill Biophotonics Series)
Organic Electronics in Sensors and Biotechnology (Mc-Graw-Hill Biophotonics Series)

The latest in organic electronics-based sensing and biotechnology

Develop high-performance, field-deployable organic semiconductor-based biological, chemical, and physical sensor arrays using the comprehensive information contained in this definitive volume. Organic Electronics in Sensors and Biotechnology...

No Middle Name: The Complete Collected Jack Reacher Short Stories
No Middle Name: The Complete Collected Jack Reacher Short Stories

NEW YORK TIMES BESTSELLER • Get ready for the ultimate Jack Reacher experience: a thrilling new novella and eleven previously published stories, together for the first time in one pulse-pounding collection from Lee Child.

No Middle Name begins with “Too Much Time,” a brand-new work of
...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy