Simple Steps to Data Encryption

A Practical Guide to Secure Computing

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Simple Steps to Data Encryption by Peter Loshin, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Peter Loshin ISBN: 9780124078826
Publisher: Elsevier Science Publication: April 30, 2013
Imprint: Syngress Language: English
Author: Peter Loshin
ISBN: 9780124078826
Publisher: Elsevier Science
Publication: April 30, 2013
Imprint: Syngress
Language: English

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography.

Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard.

The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file.

There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche.

By reading this title readers will be provided with a step by step hands-on guide that includes:

  • Simple descriptions of actual threat scenarios

  • Simple, step-by-step instructions for securing data

  • How to use open source, time-proven and peer-reviewed cryptographic software

  • Easy to follow tips for safer computing

  • Unbiased and platform-independent coverage of encryption tools and techniques

  • Simple descriptions of actual threat scenarios

  • Simple, step-by-step instructions for securing data

  • How to use open source, time-proven and peer-reviewed cryptographic software

  • Easy-to-follow tips for safer computing

  • Unbiased and platform-independent coverage of encryption tools and techniques

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography.

Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard.

The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file.

There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche.

By reading this title readers will be provided with a step by step hands-on guide that includes:

More books from Elsevier Science

Cover of the book Protected Metal Clusters: From Fundamentals to Applications by Peter Loshin
Cover of the book Semiconductors for Room Temperature Nuclear Detector Applications by Peter Loshin
Cover of the book Mechanics of Hydraulic Fracturing by Peter Loshin
Cover of the book Inequalities for Differential and Integral Equations by Peter Loshin
Cover of the book Earthquake Hazard, Risk and Disasters by Peter Loshin
Cover of the book Studies in Natural Products Chemistry by Peter Loshin
Cover of the book Sensory Panel Management by Peter Loshin
Cover of the book Advances in Genetics by Peter Loshin
Cover of the book Methods of Enzymatic Analysis by Peter Loshin
Cover of the book Stiehm's Immune Deficiencies by Peter Loshin
Cover of the book Handbook of Student Engagement Interventions by Peter Loshin
Cover of the book Nonlinear Systems in Heat Transfer by Peter Loshin
Cover of the book Lakes on Mars by Peter Loshin
Cover of the book Bioactive Food as Dietary Interventions for Diabetes by Peter Loshin
Cover of the book Electron Beam Welding by Peter Loshin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy