Protecting Your Digital Privacy

Nonfiction, Computers, Internet, Security
Cover of the book Protecting Your Digital Privacy by Paul Stafford, Paul Stafford
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Paul Stafford ISBN: 9781476185361
Publisher: Paul Stafford Publication: July 16, 2012
Imprint: Smashwords Edition Language: English
Author: Paul Stafford
ISBN: 9781476185361
Publisher: Paul Stafford
Publication: July 16, 2012
Imprint: Smashwords Edition
Language: English

Modern life is very dependent on electronic devices like mobile phones and computers. We use them for banking, shopping, email, research etc. We rarely stop to think about how they might compromise our privacy, or even our property (e.g. bank and credit cards).

This book will give you the tools necessary to protect your digital privacy from those who would invade it. The threats from hackers are well known, and everyone has received spam emails or had to remove viruses from their computer. Unfortunately, “legitimate” entities like corporations and government agencies are a greater threat, because their “attacks” are far more subtle, the effects more difficult to see. Because the attacks are more difficult to detect, some entities may even feel empowered to reach beyond lawful actions.

I will cover passwords, hiding files, secure deletion, secure email, secure internet browsing, social media and smart phone usage.

Defending your computer and online activities will entail not-insignificant effort and changes in your habits. This is not surprising - the forces arrayed against you are enormous, well-funded and always prying.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Modern life is very dependent on electronic devices like mobile phones and computers. We use them for banking, shopping, email, research etc. We rarely stop to think about how they might compromise our privacy, or even our property (e.g. bank and credit cards).

This book will give you the tools necessary to protect your digital privacy from those who would invade it. The threats from hackers are well known, and everyone has received spam emails or had to remove viruses from their computer. Unfortunately, “legitimate” entities like corporations and government agencies are a greater threat, because their “attacks” are far more subtle, the effects more difficult to see. Because the attacks are more difficult to detect, some entities may even feel empowered to reach beyond lawful actions.

I will cover passwords, hiding files, secure deletion, secure email, secure internet browsing, social media and smart phone usage.

Defending your computer and online activities will entail not-insignificant effort and changes in your habits. This is not surprising - the forces arrayed against you are enormous, well-funded and always prying.

More books from Security

Cover of the book Muzzling the Bear by Paul Stafford
Cover of the book Transparent User Authentication by Paul Stafford
Cover of the book Unmasked by Paul Stafford
Cover of the book Financial Cryptography and Data Security by Paul Stafford
Cover of the book E-discovery: Creating and Managing an Enterprisewide Program by Paul Stafford
Cover of the book Homeland Security in Europa - Ein mögliches Konzept oder Utopie? by Paul Stafford
Cover of the book Advances and Challenges in Political Transitions by Paul Stafford
Cover of the book Cyber Security Cryptography and Machine Learning by Paul Stafford
Cover of the book Rethinking the Unthinkable by Paul Stafford
Cover of the book Privacy Technologies and Policy by Paul Stafford
Cover of the book Software Similarity and Classification by Paul Stafford
Cover of the book The Command by Paul Stafford
Cover of the book UN Peace Operations by Paul Stafford
Cover of the book The Unwanted Gaze by Paul Stafford
Cover of the book Die veränderte Konfliktlage zu Beginn des 21. Jahrhunderts by Paul Stafford
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy