Protecting Your Digital Privacy

Nonfiction, Computers, Internet, Security
Cover of the book Protecting Your Digital Privacy by Paul Stafford, Paul Stafford
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Paul Stafford ISBN: 9781476185361
Publisher: Paul Stafford Publication: July 16, 2012
Imprint: Smashwords Edition Language: English
Author: Paul Stafford
ISBN: 9781476185361
Publisher: Paul Stafford
Publication: July 16, 2012
Imprint: Smashwords Edition
Language: English

Modern life is very dependent on electronic devices like mobile phones and computers. We use them for banking, shopping, email, research etc. We rarely stop to think about how they might compromise our privacy, or even our property (e.g. bank and credit cards).

This book will give you the tools necessary to protect your digital privacy from those who would invade it. The threats from hackers are well known, and everyone has received spam emails or had to remove viruses from their computer. Unfortunately, “legitimate” entities like corporations and government agencies are a greater threat, because their “attacks” are far more subtle, the effects more difficult to see. Because the attacks are more difficult to detect, some entities may even feel empowered to reach beyond lawful actions.

I will cover passwords, hiding files, secure deletion, secure email, secure internet browsing, social media and smart phone usage.

Defending your computer and online activities will entail not-insignificant effort and changes in your habits. This is not surprising - the forces arrayed against you are enormous, well-funded and always prying.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Modern life is very dependent on electronic devices like mobile phones and computers. We use them for banking, shopping, email, research etc. We rarely stop to think about how they might compromise our privacy, or even our property (e.g. bank and credit cards).

This book will give you the tools necessary to protect your digital privacy from those who would invade it. The threats from hackers are well known, and everyone has received spam emails or had to remove viruses from their computer. Unfortunately, “legitimate” entities like corporations and government agencies are a greater threat, because their “attacks” are far more subtle, the effects more difficult to see. Because the attacks are more difficult to detect, some entities may even feel empowered to reach beyond lawful actions.

I will cover passwords, hiding files, secure deletion, secure email, secure internet browsing, social media and smart phone usage.

Defending your computer and online activities will entail not-insignificant effort and changes in your habits. This is not surprising - the forces arrayed against you are enormous, well-funded and always prying.

More books from Security

Cover of the book China and Africa by Paul Stafford
Cover of the book Strategic Cooperation by Paul Stafford
Cover of the book Official (ISC)2 Guide to the CISSP CBK by Paul Stafford
Cover of the book Your Amazing Itty Bitty® Personal Data Protection Book by Paul Stafford
Cover of the book Securing Citrix XenApp Server in the Enterprise by Paul Stafford
Cover of the book NL ARMS Netherlands Annual Review of Military Studies 2016 by Paul Stafford
Cover of the book Middle Powers and the Rise of China by Paul Stafford
Cover of the book CUCKOO'S EGG by Paul Stafford
Cover of the book Hackercool Aug 2017 by Paul Stafford
Cover of the book The Boer War by Paul Stafford
Cover of the book The Indian Ocean and US Grand Strategy by Paul Stafford
Cover of the book Confronting the Evolving Global Security Landscape: Lessons from the Past and Present by Paul Stafford
Cover of the book Reasoning for Intelligence Analysts by Paul Stafford
Cover of the book Social Security Under the Gun by Paul Stafford
Cover of the book Undersea Warfare in Northern Europe by Paul Stafford
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy