Cargando…

Simple steps to data encryption : a practical guide to secure computing /

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there i...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Loshin, Peter
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington : Elsevier Science, 2013.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 SCIDIR_ocn843639624
003 OCoLC
005 20231117044856.0
006 m o d
007 cr |n|---|||||
008 130516s2013 vtu o 000 0 eng d
040 |a MHW  |b eng  |e pn  |c MHW  |d TEFOD  |d OPELS  |d N$T  |d UIU  |d OCLCF  |d UPM  |d UKDOC  |d OCLCQ  |d DKDLA  |d MEAUC  |d OCLCQ  |d UIU  |d OCLCQ  |d TEFOD  |d OCLCQ  |d ESU  |d SAV  |d OCLCQ  |d OCLCA  |d U3W  |d D6H  |d LND  |d AU@  |d OTZ  |d WYU  |d LEAUB  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 854904893  |a 1264918147 
020 |a 9780124078826  |q (electronic bk.) 
020 |a 0124078826  |q (electronic bk.) 
020 |z 9780124114838 
020 |z 0124114830 
035 |a (OCoLC)843639624  |z (OCoLC)854904893  |z (OCoLC)1264918147 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 083000  |2 bisacsh 
082 0 4 |a 005.8/2 
100 1 |a Loshin, Peter. 
245 1 0 |a Simple steps to data encryption :  |b a practical guide to secure computing /  |c Peter Loshin. 
260 |a Burlington :  |b Elsevier Science,  |c 2013. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what. 
588 0 |a Print version record. 
505 0 |a Front Cover; Simple Steps to Data Encryption; Copyright page; Contents; To the Reader; Preface: What Is This?; What Is Cryptography?; What Can Cryptography Do?; Basic Cryptographic Functions; Does "Secret" Mean the Same as "Private"?; What Else Do I Need?; What OS Should I Use?; How Do I Do All This Stuff?; Introduction; 1 Using Gnu Privacy Guard; 1.1 Keeping Data Secret, for a Novice GnuPG User; 1.2 The Simplest Example: GnuPG Symmetric Encrypting Text; 1.3 Decrypting a File (Symmetric Key); 1.4 Encrypting Interactively; 1.5 ASCII Armor; 1.6 Command Summary and Review; 1.7 Review Questions. 
505 8 |a 2 Selected FAQs on Using GnuPG2.1 Why Use GnuPG; 2.2 Why Start with the Command Line; 2.3 Why Use the Command Line; 2.4 Getting to the Command Line; 2.5 Is GnuPG Even Installed?; 2.6 GnuPG Commands and Options; 2.7 Simple Examples; 2.8 Options: Getting More Information; 2.9 Options: Text or Binary; 2.10 Command Summary and Review; 2.11 Review Questions; 3 Public Keys; 3.1 Getting Someone's Public Key; 3.2 Generating a Public Key; 3.3 Why Two Key Pairs?; 3.4 Key Length; 3.5 Key Expiration and Key Revocation; 3.6 Reasons for Key Revocation; 3.7 Generating a Public Key Pair, Completed. 
505 8 |a 3.8 Exporting a Public Key3.9 Command Summary and Review; 3.10 Review Questions; 4 Public Key Functions; 4.1 Decrypting and Verifying; 4.1.1 Pinentry Dialog Box and RAM Caching; 4.1.2 Storing ASCII-Armored Text in a File; 4.2 Web of Trust; 4.2.1 Signing a Key; 4.3 Encrypt and Sign; 4.4 Benefits of Digital Signatures; 4.5 Command Summary and Review; 4.6 Review Questions; 5 More About Signatures; 5.1 "Decrypting" a Digital Signature; 5.2 More About Signatures; 5.3 Digital Signature Types; 5.4 Signing and Verifying, Summarized; 5.4.1 Verifying a Digitally Signed File (Attached Signature) 
505 8 |a 5.5 Review Questions6 Working with Public Keys; 6.1 Trusting a Public Key; 6.1.1 Using Fingerprints; 6.1.2 Other Ways of Verifying a Public Key; 6.1.3 Fingerprints; 6.2 Using Keyservers; 6.3 Review Questions; 7 Editing and Revoking a Public Key; 7.1 Editing Keys; 7.2 Revoking a Key; 7.2.1 The Revocation Process; 7.2.2 Creating the Revocation Certificate; 7.2.3 Revoking a Key; 7.2.4 A Different Way to Revoke; 7.3 Command Summary and Review; 7.4 Review Questions; 8 Security Practices and Tips; 8.1 Verifying Software Downloads; 8.1.1 Verifying a Download With a Hash Value. 
505 8 |a 8.1.2 Calculating a Hash Value on Different OSes8.2 Passphrases: Doing Them Right; 8.3 Dangers of RAM Cache and Other System Artifacts; 8.4 Full Disk Encryption; 8.4.1 How Good Is FDE?; 8.5 Encrypting Your System Hard Drive FAQ; 8.5.1 How it Works; 8.5.2 Enabling FDE; 8.5.3 About Microsoft BitLocker; 8.5.4 About Apple FileVault; 8.5.5 About TrueCrypt; Postscript. 
650 0 |a Data encryption (Computer science) 
650 0 |a Computer security. 
650 6 |a Chiffrement (Informatique)  |0 (CaQQLa)201-0259253 
650 6 |a S�ecurit�e informatique.  |0 (CaQQLa)201-0061152 
650 7 |a COMPUTERS  |x Security  |x Cryptography.  |2 bisacsh 
650 7 |a Computer security  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
650 7 |a Engineering & Applied Sciences.  |2 hilcc 
650 7 |a Computer Science.  |2 hilcc 
776 0 8 |i Print version:  |z 9780124114838 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780124114838  |z Texto completo 
856 4 1 |u http://0-www.sciencedirect.com.emu.londonmet.ac.uk/science/book/9780124114838  |z Texto completo