Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there i
Simple Steps to Data Encryption:. A Practical Guide to Secure Computing
β Scribed by Pete Loshin (Auth.)
- Year
- 2013
- Tongue
- English
- Leaves
- 103
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Table of Contents
Content:
Front-matter, Pages i,iii
Copyright, Page iv
To the Reader, Pages vii-viii
Preface - What Is This?, Pages ix-xiii
Introduction, Pages xv-xvi
Chapter 1 - Using Gnu Privacy Guard, Pages 1-10
Chapter 2 - Selected FAQs on Using GnuPG, Pages 11-21
Chapter 3 - Public Keys, Pages 23-39
Chapter 4 - Public Key Functions, Pages 41-53
Chapter 5 - More About Signatures, Pages 55-61
Chapter 6 - Working with Public Keys, Pages 63-71
Chapter 7 - Editing and Revoking a Public Key, Pages 73-80
Chapter 8 - Security Practices and Tips, Pages 81-95
Postscript, Page 97
π SIMILAR VOLUMES
<p>Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet ther
<p>Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet ther
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourselfβstep by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You pro
<div><p>Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourselfβstep by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now?