Protecting Your Digital Privacy

Nonfiction, Computers, Internet, Security
Cover of the book Protecting Your Digital Privacy by Paul Stafford, Paul Stafford
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Paul Stafford ISBN: 9781476185361
Publisher: Paul Stafford Publication: July 16, 2012
Imprint: Smashwords Edition Language: English
Author: Paul Stafford
ISBN: 9781476185361
Publisher: Paul Stafford
Publication: July 16, 2012
Imprint: Smashwords Edition
Language: English

Modern life is very dependent on electronic devices like mobile phones and computers. We use them for banking, shopping, email, research etc. We rarely stop to think about how they might compromise our privacy, or even our property (e.g. bank and credit cards).

This book will give you the tools necessary to protect your digital privacy from those who would invade it. The threats from hackers are well known, and everyone has received spam emails or had to remove viruses from their computer. Unfortunately, “legitimate” entities like corporations and government agencies are a greater threat, because their “attacks” are far more subtle, the effects more difficult to see. Because the attacks are more difficult to detect, some entities may even feel empowered to reach beyond lawful actions.

I will cover passwords, hiding files, secure deletion, secure email, secure internet browsing, social media and smart phone usage.

Defending your computer and online activities will entail not-insignificant effort and changes in your habits. This is not surprising - the forces arrayed against you are enormous, well-funded and always prying.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Modern life is very dependent on electronic devices like mobile phones and computers. We use them for banking, shopping, email, research etc. We rarely stop to think about how they might compromise our privacy, or even our property (e.g. bank and credit cards).

This book will give you the tools necessary to protect your digital privacy from those who would invade it. The threats from hackers are well known, and everyone has received spam emails or had to remove viruses from their computer. Unfortunately, “legitimate” entities like corporations and government agencies are a greater threat, because their “attacks” are far more subtle, the effects more difficult to see. Because the attacks are more difficult to detect, some entities may even feel empowered to reach beyond lawful actions.

I will cover passwords, hiding files, secure deletion, secure email, secure internet browsing, social media and smart phone usage.

Defending your computer and online activities will entail not-insignificant effort and changes in your habits. This is not surprising - the forces arrayed against you are enormous, well-funded and always prying.

More books from Security

Cover of the book Applied Cryptography and Network Security by Paul Stafford
Cover of the book Cutting the Fuse by Paul Stafford
Cover of the book Gendering Human Security in Afghanistan by Paul Stafford
Cover of the book The Gamble of War by Paul Stafford
Cover of the book Pessimism and British War Policy, 1916-1918 by Paul Stafford
Cover of the book Der Wandel der Weltpolitik bezüglich außen- und sicherheitspolitischer Aspekte und die Bedeutung internationaler Institutionen by Paul Stafford
Cover of the book Radio Frequency Identification and IoT Security by Paul Stafford
Cover of the book Automated Security Management by Paul Stafford
Cover of the book HackerTools Crack With Disassembling by Paul Stafford
Cover of the book Operational Auditing by Paul Stafford
Cover of the book Regionale Warlords: Besserere Sicherheitsgaranten als das staatliche Gewaltmonopol in Afghanistan? by Paul Stafford
Cover of the book The Core of Hacking by Paul Stafford
Cover of the book Federated Identity Primer by Paul Stafford
Cover of the book The Uncertain Transition from Stability to Peace by Paul Stafford
Cover of the book Routledge Handbook of Security Studies by Paul Stafford
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy