Everyone wants privacy and security online, something that most
computer users have more or less given up on as far as their
personal data is concerned. There is no shortage of good encryption
software, and no shortage of books, articles and essays that
purport to be about how to use it. Yet there is precious little for
ordinary users who want just enough information about encryption to
use it safely and securely and appropriately--WITHOUT having to
become experts in cryptography.
Data encryption is a powerful tool, if used properly. Encryption
turns ordinary, readable data into what looks like gibberish, but
gibberish that only the end user can turn back into readable data
again. The difficulty of encryption has much to do with deciding
what kinds of threats one needs to protect against and then using
the proper tool in the correct way. It's kind of like a manual
transmission in a car: learning to drive with one is easy; learning
to build one is hard.
The goal of this title is to present just enough for an average
reader to begin protecting his or her data, immediately. Books and
articles currently available about encryption start out with
statistics and reports on the costs of data loss, and quickly get
bogged down in cryptographic theory and jargon followed by attempts
to comprehensively list all the latest and greatest tools and
techniques. After step-by-step walkthroughs of the download and
install process, there's precious little room left for what most
readers really want: how to encrypt a thumb drive or email message,
or digitally sign a data file.
There are terabytes of content that explain how cryptography
works, why it's important, and all the different pieces of software
that can be used to do it; there is precious little content
available that couples concrete threats to data with explicit
responses to those threats. This title fills that niche.
By reading this title readers will be provided with a step by
step hands-on guide that includes:
Simple descriptions of actual threat scenarios
Simple, step-by-step instructions for securing data
How to use open source, time-proven and peer-reviewed
cryptographic software
Easy to follow tips for safer computing
Unbiased and platform-independent coverage of encryption tools
and techniques
Simple descriptions of actual threat scenarios Simple, step-by-step
instructions for securing dataHow to use open source, time-proven
and peer-reviewed cryptographic software Easy-to-follow tips for
safer computing Unbiased and platform-independent coverage of
encryption tools and techniques
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!