Simple steps to data encryption: a practical guide to secure computing
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there i...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington
Elsevier Science
2013
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what |
Beschreibung: | 1 online resource |
ISBN: | 9780124078826 0124078826 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046126081 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2013 |||| o||u| ||||||eng d | ||
020 | |a 9780124078826 |9 978-0-12-407882-6 | ||
020 | |a 0124078826 |9 0-12-407882-6 | ||
035 | |a (ZDB-33-ESD)ocn843639624 | ||
035 | |a (OCoLC)843639624 | ||
035 | |a (DE-599)BVBBV046126081 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8/2 | |
100 | 1 | |a Loshin, Peter |e Verfasser |4 aut | |
245 | 1 | 0 | |a Simple steps to data encryption |b a practical guide to secure computing |c Peter Loshin |
264 | 1 | |a Burlington |b Elsevier Science |c 2013 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what | ||
650 | 7 | |a COMPUTERS / Security / Cryptography |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
650 | 7 | |a Engineering & Applied Sciences |2 hilcc | |
650 | 7 | |a Computer Science |2 hilcc | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer security | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0124114830 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780124114838 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780124114838 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031506534 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9780124114838 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180445807509504 |
---|---|
any_adam_object | |
author | Loshin, Peter |
author_facet | Loshin, Peter |
author_role | aut |
author_sort | Loshin, Peter |
author_variant | p l pl |
building | Verbundindex |
bvnumber | BV046126081 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn843639624 (OCoLC)843639624 (DE-599)BVBBV046126081 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02176nmm a2200433zc 4500</leader><controlfield tag="001">BV046126081</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124078826</subfield><subfield code="9">978-0-12-407882-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124078826</subfield><subfield code="9">0-12-407882-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn843639624</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)843639624</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046126081</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Loshin, Peter</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Simple steps to data encryption</subfield><subfield code="b">a practical guide to secure computing</subfield><subfield code="c">Peter Loshin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington</subfield><subfield code="b">Elsevier Science</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Engineering & Applied Sciences</subfield><subfield code="2">hilcc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer Science</subfield><subfield code="2">hilcc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0124114830</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780124114838</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780124114838</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031506534</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124114838</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046126081 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:35:53Z |
institution | BVB |
isbn | 9780124078826 0124078826 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031506534 |
oclc_num | 843639624 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Elsevier Science |
record_format | marc |
spelling | Loshin, Peter Verfasser aut Simple steps to data encryption a practical guide to secure computing Peter Loshin Burlington Elsevier Science 2013 1 online resource txt rdacontent c rdamedia cr rdacarrier Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what COMPUTERS / Security / Cryptography bisacsh Computer security fast Data encryption (Computer science) fast Engineering & Applied Sciences hilcc Computer Science hilcc Data encryption (Computer science) Computer security Erscheint auch als Druck-Ausgabe 0124114830 Erscheint auch als Druck-Ausgabe 9780124114838 http://www.sciencedirect.com/science/book/9780124114838 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Loshin, Peter Simple steps to data encryption a practical guide to secure computing COMPUTERS / Security / Cryptography bisacsh Computer security fast Data encryption (Computer science) fast Engineering & Applied Sciences hilcc Computer Science hilcc Data encryption (Computer science) Computer security |
title | Simple steps to data encryption a practical guide to secure computing |
title_auth | Simple steps to data encryption a practical guide to secure computing |
title_exact_search | Simple steps to data encryption a practical guide to secure computing |
title_full | Simple steps to data encryption a practical guide to secure computing Peter Loshin |
title_fullStr | Simple steps to data encryption a practical guide to secure computing Peter Loshin |
title_full_unstemmed | Simple steps to data encryption a practical guide to secure computing Peter Loshin |
title_short | Simple steps to data encryption |
title_sort | simple steps to data encryption a practical guide to secure computing |
title_sub | a practical guide to secure computing |
topic | COMPUTERS / Security / Cryptography bisacsh Computer security fast Data encryption (Computer science) fast Engineering & Applied Sciences hilcc Computer Science hilcc Data encryption (Computer science) Computer security |
topic_facet | COMPUTERS / Security / Cryptography Computer security Data encryption (Computer science) Engineering & Applied Sciences Computer Science |
url | http://www.sciencedirect.com/science/book/9780124114838 |
work_keys_str_mv | AT loshinpeter simplestepstodataencryptionapracticalguidetosecurecomputing |