For those with legitimate reason to use the Internet
anonymously--diplomats, military and other government agencies,
journalists, political activists, IT professionals, law enforcement
personnel, political refugees and others--anonymous networking
provides an invaluable tool, and many good reasons that anonymity
can serve a very important purpose. Anonymous use of the Internet
is made difficult by the many websites that know everything about
us, by the cookies and ad networks, IP-logging ISPs, even nosy
officials may get involved. It is no longer possible to turn off
browser cookies to be left alone in your online life. "Practical
Anonymity: Hiding in Plain Sight Online "shows you how to use the
most effective and widely-used anonymity tools--the ones that
protect diplomats, military and other government agencies to become
invisible online. This "practical "guide skips the theoretical and
technical details and focuses on getting from zero to anonymous as
fast as possible.
For many, using any of the open-source, peer-reviewed tools for
connecting to the Internet via an anonymous network may be (or seem
to be) too difficult becausemost of the information about these
tools is burdened with discussions of how they work and how to
maximize security. Even tech-savvy users may find the burden too
great--but actually using the tools can be pretty simple.
The primary market for this book consists of IT professionals
who need/want tools for anonymity to test/work around corporate
firewalls and router filtering as well as provide anonymity tools
to their customers.
Simple, step-by-step instructions for configuring and using
anonymous networking software Simple, step-by-step instructions for
configuring and using anonymous networking software Use of open
source, time-proven and peer-reviewed tools for anonymity
Plain-language discussion of actual threats and concrete
suggestions for appropriate responses Easy-to-follow tips for safer
computing
Simple, step-by-step instructions for configuring and using
anonymous networking software Use of open source, time-proven and
peer-reviewed tools for anonymity Plain-language discussion of
actual threats, and concrete suggestions for appropriate responses
Easy to follow tips for safer computing. "
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!