Digital privacy and security using Windows: a practical guide
"This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint... The book h...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York, NY
Apress
[2017]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint... The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird."...Page 4 of cover |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xxiv, 284 Seiten Illustrationen |
ISBN: | 9781484227985 1484227980 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044984025 | ||
003 | DE-604 | ||
005 | 20180613 | ||
007 | t | ||
008 | 180604s2017 xxua||| |||| 00||| eng d | ||
010 | |a 017947159 | ||
020 | |a 9781484227985 |9 978-1-4842-2798-5 | ||
020 | |a 1484227980 |9 1-4842-2798-0 | ||
035 | |a (OCoLC)1010489584 | ||
035 | |a (DE-599)BVBBV044984025 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-521 | ||
050 | 0 | |a QA76.9.A25 | |
084 | |a ST 261 |0 (DE-625)143633: |2 rvk | ||
100 | 1 | |a Hassan, Nihad A. |4 aut | |
245 | 1 | 0 | |a Digital privacy and security using Windows |b a practical guide |c Nihad A. Hassan, Rami Hijazi |
264 | 1 | |a New York, NY |b Apress |c [2017] | |
264 | 4 | |c © 2017 | |
300 | |a xxiv, 284 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a "This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint... The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird."...Page 4 of cover | ||
630 | 0 | 4 | |a Microsoft Windows (Computer file) |
650 | 4 | |a MATHEMATICS / General / bisacsh | |
650 | 4 | |a Data protection |x Security measures | |
650 | 4 | |a Internet |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data recovery (Computer science) | |
650 | 4 | |a Virtual computer systems | |
650 | 4 | |a MATHEMATICS / General | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Hijazi, Rami |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |o 10.1007/978-1-4842-2799-2 |z 978-1-4842-2799-2 |
856 | 4 | 2 | |m LoC Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030376366&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-030376366 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804178587292532736 |
---|---|
adam_text | DIGITAL PRIVACY AND SECURITY USING WINDOWS
/ HASSAN, NIHAD A.YYEAUTHOR
: 2017
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTION TO THE CURRENT STATUS OF ONLINE PRIVACY
ESSENTIAL PRIVACY TIPS
WINDOWS SECURITY
ONLINE ANONYMITY
CRYPTOGRAPHY AND SECURE COMMUNICATION
WHAT S NEXT?
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Hassan, Nihad A. Hijazi, Rami |
author_facet | Hassan, Nihad A. Hijazi, Rami |
author_role | aut aut |
author_sort | Hassan, Nihad A. |
author_variant | n a h na nah r h rh |
building | Verbundindex |
bvnumber | BV044984025 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 261 |
ctrlnum | (OCoLC)1010489584 (DE-599)BVBBV044984025 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02634nam a2200529 c 4500</leader><controlfield tag="001">BV044984025</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180613 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">180604s2017 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">017947159</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484227985</subfield><subfield code="9">978-1-4842-2798-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1484227980</subfield><subfield code="9">1-4842-2798-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1010489584</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044984025</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-521</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 261</subfield><subfield code="0">(DE-625)143633:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hassan, Nihad A.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital privacy and security using Windows</subfield><subfield code="b">a practical guide</subfield><subfield code="c">Nihad A. Hassan, Rami Hijazi</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Apress</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxiv, 284 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint... The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird."...Page 4 of cover</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">MATHEMATICS / General / bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data recovery (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Virtual computer systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">MATHEMATICS / General</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hijazi, Rami</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="o">10.1007/978-1-4842-2799-2</subfield><subfield code="z">978-1-4842-2799-2</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">LoC Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030376366&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030376366</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV044984025 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:06:20Z |
institution | BVB |
isbn | 9781484227985 1484227980 |
language | English |
lccn | 017947159 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030376366 |
oclc_num | 1010489584 |
open_access_boolean | |
owner | DE-521 |
owner_facet | DE-521 |
physical | xxiv, 284 Seiten Illustrationen |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Apress |
record_format | marc |
spelling | Hassan, Nihad A. aut Digital privacy and security using Windows a practical guide Nihad A. Hassan, Rami Hijazi New York, NY Apress [2017] © 2017 xxiv, 284 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index "This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint... The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird."...Page 4 of cover Microsoft Windows (Computer file) MATHEMATICS / General / bisacsh Data protection Security measures Internet Security measures Computer security Data recovery (Computer science) Virtual computer systems MATHEMATICS / General Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Hijazi, Rami aut Erscheint auch als Online-Ausgabe 10.1007/978-1-4842-2799-2 978-1-4842-2799-2 LoC Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030376366&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Hassan, Nihad A. Hijazi, Rami Digital privacy and security using Windows a practical guide Microsoft Windows (Computer file) MATHEMATICS / General / bisacsh Data protection Security measures Internet Security measures Computer security Data recovery (Computer science) Virtual computer systems MATHEMATICS / General Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 |
title | Digital privacy and security using Windows a practical guide |
title_auth | Digital privacy and security using Windows a practical guide |
title_exact_search | Digital privacy and security using Windows a practical guide |
title_full | Digital privacy and security using Windows a practical guide Nihad A. Hassan, Rami Hijazi |
title_fullStr | Digital privacy and security using Windows a practical guide Nihad A. Hassan, Rami Hijazi |
title_full_unstemmed | Digital privacy and security using Windows a practical guide Nihad A. Hassan, Rami Hijazi |
title_short | Digital privacy and security using Windows |
title_sort | digital privacy and security using windows a practical guide |
title_sub | a practical guide |
topic | Microsoft Windows (Computer file) MATHEMATICS / General / bisacsh Data protection Security measures Internet Security measures Computer security Data recovery (Computer science) Virtual computer systems MATHEMATICS / General Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Microsoft Windows (Computer file) MATHEMATICS / General / bisacsh Data protection Security measures Internet Security measures Computer security Data recovery (Computer science) Virtual computer systems MATHEMATICS / General Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030376366&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT hassannihada digitalprivacyandsecurityusingwindowsapracticalguide AT hijazirami digitalprivacyandsecurityusingwindowsapracticalguide |