Simple steps to data encryption : a practical guide to secure computing /
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there i...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Burlington :
Elsevier Science,
2013.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | SCIDIR_ocn843639624 | ||
003 | OCoLC | ||
005 | 20231117044856.0 | ||
006 | m o d | ||
007 | cr |n|---||||| | ||
008 | 130516s2013 vtu o 000 0 eng d | ||
040 | |a MHW |b eng |e pn |c MHW |d TEFOD |d OPELS |d N$T |d UIU |d OCLCF |d UPM |d UKDOC |d OCLCQ |d DKDLA |d MEAUC |d OCLCQ |d UIU |d OCLCQ |d TEFOD |d OCLCQ |d ESU |d SAV |d OCLCQ |d OCLCA |d U3W |d D6H |d LND |d AU@ |d OTZ |d WYU |d LEAUB |d OCLCO |d OCLCQ |d OCLCO | ||
019 | |a 854904893 |a 1264918147 | ||
020 | |a 9780124078826 |q (electronic bk.) | ||
020 | |a 0124078826 |q (electronic bk.) | ||
020 | |z 9780124114838 | ||
020 | |z 0124114830 | ||
035 | |a (OCoLC)843639624 |z (OCoLC)854904893 |z (OCoLC)1264918147 | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM |x 083000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8/2 |
100 | 1 | |a Loshin, Peter. | |
245 | 1 | 0 | |a Simple steps to data encryption : |b a practical guide to secure computing / |c Peter Loshin. |
260 | |a Burlington : |b Elsevier Science, |c 2013. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
520 | |a Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Front Cover; Simple Steps to Data Encryption; Copyright page; Contents; To the Reader; Preface: What Is This?; What Is Cryptography?; What Can Cryptography Do?; Basic Cryptographic Functions; Does "Secret" Mean the Same as "Private"?; What Else Do I Need?; What OS Should I Use?; How Do I Do All This Stuff?; Introduction; 1 Using Gnu Privacy Guard; 1.1 Keeping Data Secret, for a Novice GnuPG User; 1.2 The Simplest Example: GnuPG Symmetric Encrypting Text; 1.3 Decrypting a File (Symmetric Key); 1.4 Encrypting Interactively; 1.5 ASCII Armor; 1.6 Command Summary and Review; 1.7 Review Questions. | |
505 | 8 | |a 2 Selected FAQs on Using GnuPG2.1 Why Use GnuPG; 2.2 Why Start with the Command Line; 2.3 Why Use the Command Line; 2.4 Getting to the Command Line; 2.5 Is GnuPG Even Installed?; 2.6 GnuPG Commands and Options; 2.7 Simple Examples; 2.8 Options: Getting More Information; 2.9 Options: Text or Binary; 2.10 Command Summary and Review; 2.11 Review Questions; 3 Public Keys; 3.1 Getting Someone's Public Key; 3.2 Generating a Public Key; 3.3 Why Two Key Pairs?; 3.4 Key Length; 3.5 Key Expiration and Key Revocation; 3.6 Reasons for Key Revocation; 3.7 Generating a Public Key Pair, Completed. | |
505 | 8 | |a 3.8 Exporting a Public Key3.9 Command Summary and Review; 3.10 Review Questions; 4 Public Key Functions; 4.1 Decrypting and Verifying; 4.1.1 Pinentry Dialog Box and RAM Caching; 4.1.2 Storing ASCII-Armored Text in a File; 4.2 Web of Trust; 4.2.1 Signing a Key; 4.3 Encrypt and Sign; 4.4 Benefits of Digital Signatures; 4.5 Command Summary and Review; 4.6 Review Questions; 5 More About Signatures; 5.1 "Decrypting" a Digital Signature; 5.2 More About Signatures; 5.3 Digital Signature Types; 5.4 Signing and Verifying, Summarized; 5.4.1 Verifying a Digitally Signed File (Attached Signature) | |
505 | 8 | |a 5.5 Review Questions6 Working with Public Keys; 6.1 Trusting a Public Key; 6.1.1 Using Fingerprints; 6.1.2 Other Ways of Verifying a Public Key; 6.1.3 Fingerprints; 6.2 Using Keyservers; 6.3 Review Questions; 7 Editing and Revoking a Public Key; 7.1 Editing Keys; 7.2 Revoking a Key; 7.2.1 The Revocation Process; 7.2.2 Creating the Revocation Certificate; 7.2.3 Revoking a Key; 7.2.4 A Different Way to Revoke; 7.3 Command Summary and Review; 7.4 Review Questions; 8 Security Practices and Tips; 8.1 Verifying Software Downloads; 8.1.1 Verifying a Download With a Hash Value. | |
505 | 8 | |a 8.1.2 Calculating a Hash Value on Different OSes8.2 Passphrases: Doing Them Right; 8.3 Dangers of RAM Cache and Other System Artifacts; 8.4 Full Disk Encryption; 8.4.1 How Good Is FDE?; 8.5 Encrypting Your System Hard Drive FAQ; 8.5.1 How it Works; 8.5.2 Enabling FDE; 8.5.3 About Microsoft BitLocker; 8.5.4 About Apple FileVault; 8.5.5 About TrueCrypt; Postscript. | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a Computer security. | |
650 | 6 | |a Chiffrement (Informatique) |0 (CaQQLa)201-0259253 | |
650 | 6 | |a S�ecurit�e informatique. |0 (CaQQLa)201-0061152 | |
650 | 7 | |a COMPUTERS |x Security |x Cryptography. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast |0 (OCoLC)fst00872484 | |
650 | 7 | |a Data encryption (Computer science) |2 fast |0 (OCoLC)fst00887935 | |
650 | 7 | |a Engineering & Applied Sciences. |2 hilcc | |
650 | 7 | |a Computer Science. |2 hilcc | |
776 | 0 | 8 | |i Print version: |z 9780124114838 |
856 | 4 | 0 | |u https://sciencedirect.uam.elogim.com/science/book/9780124114838 |z Texto completo |
856 | 4 | 1 | |u http://0-www.sciencedirect.com.emu.londonmet.ac.uk/science/book/9780124114838 |z Texto completo |