Simple steps to data encryption: a practical guide to secure computing
β Scribed by Loshin, Peter
- Publisher
- Elsevier Science;Syngress
- Year
- 2013
- Tongue
- English
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Table of Contents
Chapter 1: Managing Keys Chapter 2: Data Integrity Chapter 3: Data Encryption Chapter 4: Encrypting Drives Chapter 5: Tips and Pointers
β¦ Subjects
Computer security;Data encryption (Computer science);Electronic books
π SIMILAR VOLUMES
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there i
<p>Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet ther
<p>Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet ther
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourselfβstep by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You pro
<div><p>Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourselfβstep by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now?