Simple steps to data encryption: a practical guide to secure computing
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington
Elsevier Science
2013
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what |
Beschreibung: | 1 Online-Ressource (1 online resource) |
ISBN: | 9780124078826 0124078826 9780124114838 0124114830 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042314321 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2013 |||| o||u| ||||||eng d | ||
020 | |a 9780124078826 |c electronic bk. |9 978-0-12-407882-6 | ||
020 | |a 0124078826 |c electronic bk. |9 0-12-407882-6 | ||
020 | |a 9780124114838 |9 978-0-12-411483-8 | ||
020 | |a 0124114830 |9 0-12-411483-0 | ||
035 | |a (OCoLC)843639624 | ||
035 | |a (DE-599)BVBBV042314321 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8/2 | |
100 | 1 | |a Loshin, Peter |e Verfasser |4 aut | |
245 | 1 | 0 | |a Simple steps to data encryption |b a practical guide to secure computing |c Peter Loshin |
264 | 1 | |a Burlington |b Elsevier Science |c 2013 | |
300 | |a 1 Online-Ressource (1 online resource) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what | ||
650 | 7 | |a COMPUTERS / Security / Cryptography |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer security | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780124114838 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027751312 |
Datensatz im Suchindex
_version_ | 1804152907351719936 |
---|---|
any_adam_object | |
author | Loshin, Peter |
author_facet | Loshin, Peter |
author_role | aut |
author_sort | Loshin, Peter |
author_variant | p l pl |
building | Verbundindex |
bvnumber | BV042314321 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (OCoLC)843639624 (DE-599)BVBBV042314321 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01998nmm a2200421zc 4500</leader><controlfield tag="001">BV042314321</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124078826</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-407882-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124078826</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-407882-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124114838</subfield><subfield code="9">978-0-12-411483-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124114830</subfield><subfield code="9">0-12-411483-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)843639624</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042314321</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Loshin, Peter</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Simple steps to data encryption</subfield><subfield code="b">a practical guide to secure computing</subfield><subfield code="c">Peter Loshin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington</subfield><subfield code="b">Elsevier Science</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780124114838</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027751312</subfield></datafield></record></collection> |
id | DE-604.BV042314321 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:18:10Z |
institution | BVB |
isbn | 9780124078826 0124078826 9780124114838 0124114830 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027751312 |
oclc_num | 843639624 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (1 online resource) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Elsevier Science |
record_format | marc |
spelling | Loshin, Peter Verfasser aut Simple steps to data encryption a practical guide to secure computing Peter Loshin Burlington Elsevier Science 2013 1 Online-Ressource (1 online resource) txt rdacontent c rdamedia cr rdacarrier Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what COMPUTERS / Security / Cryptography bisacsh Computer security fast Data encryption (Computer science) fast Data encryption (Computer science) Computer security http://www.sciencedirect.com/science/book/9780124114838 Verlag Volltext |
spellingShingle | Loshin, Peter Simple steps to data encryption a practical guide to secure computing COMPUTERS / Security / Cryptography bisacsh Computer security fast Data encryption (Computer science) fast Data encryption (Computer science) Computer security |
title | Simple steps to data encryption a practical guide to secure computing |
title_auth | Simple steps to data encryption a practical guide to secure computing |
title_exact_search | Simple steps to data encryption a practical guide to secure computing |
title_full | Simple steps to data encryption a practical guide to secure computing Peter Loshin |
title_fullStr | Simple steps to data encryption a practical guide to secure computing Peter Loshin |
title_full_unstemmed | Simple steps to data encryption a practical guide to secure computing Peter Loshin |
title_short | Simple steps to data encryption |
title_sort | simple steps to data encryption a practical guide to secure computing |
title_sub | a practical guide to secure computing |
topic | COMPUTERS / Security / Cryptography bisacsh Computer security fast Data encryption (Computer science) fast Data encryption (Computer science) Computer security |
topic_facet | COMPUTERS / Security / Cryptography Computer security Data encryption (Computer science) |
url | http://www.sciencedirect.com/science/book/9780124114838 |
work_keys_str_mv | AT loshinpeter simplestepstodataencryptionapracticalguidetosecurecomputing |