|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn992988887 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
170707s2017 nyu ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d EBLCP
|d GW5XE
|d OCLCF
|d YDX
|d UAB
|d ESU
|d AZU
|d UPM
|d IOG
|d COO
|d OCLCQ
|d GO3
|d MERER
|d UMI
|d OCLCQ
|d STF
|d VT2
|d IDB
|d K6U
|d MERUC
|d OCLCA
|d SNK
|d LIV
|d U3W
|d D6H
|d CAUOI
|d VVB
|d OCLCQ
|d CEF
|d KSU
|d UWW
|d AU@
|d OCLCA
|d WYU
|d UKMGB
|d AUD
|d LEAUB
|d UKAHL
|d CNCEN
|d G3B
|d HS0
|d ERF
|d UKBTH
|d UHL
|d LEATE
|d OCLCQ
|d SRU
|d ADU
|d VLY
|d BRF
|d AJS
|d TOH
|d EYM
|d NLW
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
066 |
|
|
|c Zsym
|
015 |
|
|
|a GBB8M4515
|2 bnb
|
016 |
7 |
|
|a 019140006
|2 Uk
|
019 |
|
|
|a 993590826
|a 1000439693
|a 1002312777
|a 1005138973
|a 1005836851
|a 1008956768
|a 1011793398
|a 1048205741
|a 1066445477
|a 1066679976
|a 1086529549
|a 1103268861
|a 1113165915
|a 1113804815
|a 1114094145
|a 1122815461
|a 1129374300
|a 1153048702
|a 1162170447
|
020 |
|
|
|a 9781484227992
|q (electronic bk.)
|
020 |
|
|
|a 1484227999
|q (electronic bk.)
|
020 |
|
|
|z 9781484227985
|
020 |
|
|
|z 1484227980
|
024 |
7 |
|
|a 10.1007/978-1-4842-2799-2
|2 doi
|
024 |
8 |
|
|a 9781484227985
|
029 |
1 |
|
|a AU@
|b 000060624525
|
029 |
1 |
|
|a CHVBK
|b 495242225
|
029 |
1 |
|
|a CHNEW
|b 000966368
|
029 |
1 |
|
|a GBVCP
|b 101493589X
|
029 |
1 |
|
|a UKMGB
|b 019140006
|
029 |
1 |
|
|a AU@
|b 000067104066
|
029 |
1 |
|
|a AU@
|b 000068984903
|
035 |
|
|
|a (OCoLC)992988887
|z (OCoLC)993590826
|z (OCoLC)1000439693
|z (OCoLC)1002312777
|z (OCoLC)1005138973
|z (OCoLC)1005836851
|z (OCoLC)1008956768
|z (OCoLC)1011793398
|z (OCoLC)1048205741
|z (OCoLC)1066445477
|z (OCoLC)1066679976
|z (OCoLC)1086529549
|z (OCoLC)1103268861
|z (OCoLC)1113165915
|z (OCoLC)1113804815
|z (OCoLC)1114094145
|z (OCoLC)1122815461
|z (OCoLC)1129374300
|z (OCoLC)1153048702
|z (OCoLC)1162170447
|
037 |
|
|
|a CL0500000897
|b Safari Books Online
|
050 |
|
4 |
|a QA76.76.O63
|
072 |
|
7 |
|a COM
|x 046050
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UR
|2 thema
|
082 |
0 |
4 |
|a 005.4469
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Hassan, Nihad A.,
|e author.
|
245 |
1 |
0 |
|a Digital privacy and security using windows :
|b a practical guide /
|c Nihad A. Hassan, Rami Hijazi.
|
264 |
|
1 |
|a [New York, NY] :
|b Apress,
|c 2017.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed July 12, 2017).
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Introduction to the current status of online privacy -- Essential privacy tips -- Windows security -- Online anonymity -- Cryptography and secure communication -- What's next?
|
520 |
|
|
|a "This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint ... The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird."--Page 4 of cover.
|
542 |
|
|
|f Copyright © 2017 by Nihad A. Hassan and Rami Hijazi
|g 2017
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Microsoft Windows (Computer file)
|
630 |
0 |
7 |
|a Microsoft Windows (Computer file)
|2 fast
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Virtual computer systems.
|
650 |
|
0 |
|a Data recovery (Computer science)
|
650 |
|
2 |
|a Computer Security
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Security.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Systèmes virtuels (Informatique)
|
650 |
|
6 |
|a Récupération des données (Informatique)
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a COMPUTERS
|x Operating Systems
|x Windows Server.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data recovery (Computer science)
|2 fast
|
650 |
|
7 |
|a Virtual computer systems
|2 fast
|
700 |
1 |
|
|a Hijazi, Rami,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Hassan, Nihad A.
|t Digital privacy and security using windows.
|d [New York, NY] : Apress, 2017
|z 9781484227985
|z 1484227980
|w (OCoLC)985082291
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781484227985/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
880 |
|
4 |
|6 264-00
|c �2017
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH33062896
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4898721
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1547754
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14673120
|
994 |
|
|
|a 92
|b IZTAP
|