Protecting Your Digital Privacy

Nonfiction, Computers, Internet, Security
Cover of the book Protecting Your Digital Privacy by Paul Stafford, Paul Stafford
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Paul Stafford ISBN: 9781476185361
Publisher: Paul Stafford Publication: July 16, 2012
Imprint: Smashwords Edition Language: English
Author: Paul Stafford
ISBN: 9781476185361
Publisher: Paul Stafford
Publication: July 16, 2012
Imprint: Smashwords Edition
Language: English

Modern life is very dependent on electronic devices like mobile phones and computers. We use them for banking, shopping, email, research etc. We rarely stop to think about how they might compromise our privacy, or even our property (e.g. bank and credit cards).

This book will give you the tools necessary to protect your digital privacy from those who would invade it. The threats from hackers are well known, and everyone has received spam emails or had to remove viruses from their computer. Unfortunately, “legitimate” entities like corporations and government agencies are a greater threat, because their “attacks” are far more subtle, the effects more difficult to see. Because the attacks are more difficult to detect, some entities may even feel empowered to reach beyond lawful actions.

I will cover passwords, hiding files, secure deletion, secure email, secure internet browsing, social media and smart phone usage.

Defending your computer and online activities will entail not-insignificant effort and changes in your habits. This is not surprising - the forces arrayed against you are enormous, well-funded and always prying.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Modern life is very dependent on electronic devices like mobile phones and computers. We use them for banking, shopping, email, research etc. We rarely stop to think about how they might compromise our privacy, or even our property (e.g. bank and credit cards).

This book will give you the tools necessary to protect your digital privacy from those who would invade it. The threats from hackers are well known, and everyone has received spam emails or had to remove viruses from their computer. Unfortunately, “legitimate” entities like corporations and government agencies are a greater threat, because their “attacks” are far more subtle, the effects more difficult to see. Because the attacks are more difficult to detect, some entities may even feel empowered to reach beyond lawful actions.

I will cover passwords, hiding files, secure deletion, secure email, secure internet browsing, social media and smart phone usage.

Defending your computer and online activities will entail not-insignificant effort and changes in your habits. This is not surprising - the forces arrayed against you are enormous, well-funded and always prying.

More books from Security

Cover of the book Cyber Security on Azure by Paul Stafford
Cover of the book Women Suicide Bombers by Paul Stafford
Cover of the book Cyber Security: Analytics, Technology and Automation by Paul Stafford
Cover of the book Protecting Mobile Networks and Devices by Paul Stafford
Cover of the book Revolution and War by Paul Stafford
Cover of the book Understanding Cyber Conflict by Paul Stafford
Cover of the book Theory of Cryptography by Paul Stafford
Cover of the book Global Politics and the Responsibility to Protect by Paul Stafford
Cover of the book The Vanishing of Flight MH370 by Paul Stafford
Cover of the book Some Tutorials In Computer Hacking by Paul Stafford
Cover of the book Body of Secrets by Paul Stafford
Cover of the book Wars of Law by Paul Stafford
Cover of the book The Washington Post Pulitzers: Carol Leonnig, National Reporting by Paul Stafford
Cover of the book Seven Deadliest Wireless Technologies Attacks by Paul Stafford
Cover of the book Detection of Intrusions and Malware, and Vulnerability Assessment by Paul Stafford
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy