skip to content
Simple steps to data encryption : a practical guide to secure computing Preview this item
ClosePreview this item
Checking...

Simple steps to data encryption : a practical guide to secure computing

Author: Peter Loshin
Publisher: Burlington : Elsevier Science, 2013.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Peter Loshin
ISBN: 9780124078826 0124078826
OCLC Number: 843639624
Description: 1 online resource
Contents: Machine generated contents note: ch. 1 Using Gnu Privacy Guard --
1.1. Keeping Data Secret, for a Novice GnuPG User --
1.2. The Simplest Example: GnuPG Symmetric Encrypting Text --
1.3. Decrypting a File (Symmetric Key) --
1.4. Encrypting Interactively --
1.5. ASCII Armor --
1.6.Command Summary and Review --
1.7. Review Questions --
ch. 2 Selected FAQs on Using GnuPG --
2.1. Why Use GnuPG --
2.2. Why Start with the Command Line --
2.3. Why Use the Command Line --
2.4. Getting to the Command Line --
2.5. Is GnuPG Even Installed? --
2.6. GnuPG Commands and Options --
2.7. Simple Examples --
2.8. Options: Getting More Information --
2.9. Options: Text or Binary --
2.10.Command Summary and Review --
2.11. Review Questions --
ch. 3 Public Keys --
3.1. Getting Someone's Public Key --
3.2. Generating a Public Key --
3.3. Why Two Key Pairs? --
3.4. Key Length --
3.5. Key Expiration and Key Revocation --
3.6. Reasons for Key Revocation --
3.7. Generating a Public Key Pair, Completed --
3.8. Exporting a Public Key --
3.9.Command Summary and Review --
3.10. Review Questions --
ch. 4 Public Key Functions --
4.1. Decrypting and Verifying --
4.2. Web of Trust --
4.3. Encrypt and Sign --
4.4. Benefits of Digital Signatures --
4.5.Command Summary and Review --
4.6. Review Questions --
ch. 5 More About Signatures --
5.1."Decrypting" a Digital Signature --
5.2. More About Signatures --
5.3. Digital Signature Types --
5.4. Signing and Verifying, Summarized --
5.5. Review Questions --
ch. 6 Working with Public Keys --
6.1. Trusting a Public Key --
6.2. Using Keyservers --
6.3. Review Questions --
ch. 7 Editing and Revoking a Public Key --
7.1. Editing Keys --
7.2. Revoking a Key --
7.3.Command Summary and Review --
7.4. Review Questions --
ch. 8 Security Practices and Tips --
8.1. Verifying Software Downloads --
8.2. Passphrases: Doing Them Right --
8.3. Dangers of RAM Cache and Other System Artifacts --
8.4. Full Disk Encryption --
8.5. Encrypting Your System Hard Drive FAQ.
Responsibility: Peter Loshin.

Abstract:

Data encryption is a powerful tool, if used properly. This title provides with a step by step hands-on guide that includes: simple descriptions of actual threat scenarios; simple, step-by-step  Read more...

Reviews

Editorial reviews

Publisher Synopsis

"This book couldn't have come at a more opportune time...The message here is that everyone can benefit from protecting their information, and you should be doing it as a matter of habit in your Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(3)

User lists with this item (2)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/843639624> # Simple steps to data encryption : a practical guide to secure computing
    a schema:CreativeWork, schema:MediaObject, schema:Book ;
   library:oclcnum "843639624" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1330338999#Place/burlington> ; # Burlington
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/vtu> ;
   rdfs:comment "Warning: This malformed URI has been treated as a string - 'http://images.contentreserve.com/ImageType-100/1706-1/{A875857C-C5C6-4A61-9047-C5A6D7F648F8}Img100.jpg'" ;
   schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
   schema:about <http://id.worldcat.org/fast/887935> ; # Data encryption (Computer science)
   schema:about <http://dewey.info/class/005.82/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/1330338999#Topic/computers_security_cryptography> ; # COMPUTERS--Security--Cryptography
   schema:bookFormat schema:EBook ;
   schema:creator <http://viaf.org/viaf/22321113> ; # Peter Loshin
   schema:datePublished "2013" ;
   schema:description "Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what."@en ;
   schema:description "Machine generated contents note: ch. 1 Using Gnu Privacy Guard -- 1.1. Keeping Data Secret, for a Novice GnuPG User -- 1.2. The Simplest Example: GnuPG Symmetric Encrypting Text -- 1.3. Decrypting a File (Symmetric Key) -- 1.4. Encrypting Interactively -- 1.5. ASCII Armor -- 1.6.Command Summary and Review -- 1.7. Review Questions -- ch. 2 Selected FAQs on Using GnuPG -- 2.1. Why Use GnuPG -- 2.2. Why Start with the Command Line -- 2.3. Why Use the Command Line -- 2.4. Getting to the Command Line -- 2.5. Is GnuPG Even Installed? -- 2.6. GnuPG Commands and Options -- 2.7. Simple Examples -- 2.8. Options: Getting More Information -- 2.9. Options: Text or Binary -- 2.10.Command Summary and Review -- 2.11. Review Questions -- ch. 3 Public Keys -- 3.1. Getting Someone's Public Key -- 3.2. Generating a Public Key -- 3.3. Why Two Key Pairs? -- 3.4. Key Length -- 3.5. Key Expiration and Key Revocation -- 3.6. Reasons for Key Revocation -- 3.7. Generating a Public Key Pair, Completed -- 3.8. Exporting a Public Key -- 3.9.Command Summary and Review -- 3.10. Review Questions -- ch. 4 Public Key Functions -- 4.1. Decrypting and Verifying -- 4.2. Web of Trust -- 4.3. Encrypt and Sign -- 4.4. Benefits of Digital Signatures -- 4.5.Command Summary and Review -- 4.6. Review Questions -- ch. 5 More About Signatures -- 5.1."Decrypting" a Digital Signature -- 5.2. More About Signatures -- 5.3. Digital Signature Types -- 5.4. Signing and Verifying, Summarized -- 5.5. Review Questions -- ch. 6 Working with Public Keys -- 6.1. Trusting a Public Key -- 6.2. Using Keyservers -- 6.3. Review Questions -- ch. 7 Editing and Revoking a Public Key -- 7.1. Editing Keys -- 7.2. Revoking a Key -- 7.3.Command Summary and Review -- 7.4. Review Questions -- ch. 8 Security Practices and Tips -- 8.1. Verifying Software Downloads -- 8.2. Passphrases: Doing Them Right -- 8.3. Dangers of RAM Cache and Other System Artifacts -- 8.4. Full Disk Encryption -- 8.5. Encrypting Your System Hard Drive FAQ."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/1330338999> ;
   schema:genre "Electronic books"@en ;
   schema:inLanguage "en" ;
   schema:isSimilarTo <http://worldcat.org/entity/work/data/1330338999#CreativeWork/> ;
   schema:name "Simple steps to data encryption : a practical guide to secure computing"@en ;
   schema:productID "843639624" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/843639624#PublicationEvent/burlington_elsevier_science_2013> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/1330338999#Agent/elsevier_science> ; # Elsevier Science
   schema:url <http://www.123library.org/book_details/?id=101417> ;
   schema:url "http://images.contentreserve.com/ImageType-100/1706-1/{A875857C-C5C6-4A61-9047-C5A6D7F648F8}Img100.jpg" ;
   schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=515422> ;
   schema:url <https://www.overdrive.com/search?q=A875857C-C5C6-4A61-9047-C5A6D7F648F8> ;
   schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=515422> ;
   schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=1115182> ;
   schema:url <http://www.sciencedirect.com/science/book/9780124114838> ;
   schema:url <https://samples.overdrive.com/simple-steps-to-a87585?.epub-sample.overdrive.com> ;
   schema:workExample <http://worldcat.org/isbn/9780124078826> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/843639624> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1330338999#Agent/elsevier_science> # Elsevier Science
    a bgn:Agent ;
   schema:name "Elsevier Science" ;
    .

<http://experiment.worldcat.org/entity/work/data/1330338999#Topic/computers_security_cryptography> # COMPUTERS--Security--Cryptography
    a schema:Intangible ;
   schema:name "COMPUTERS--Security--Cryptography"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/887935> # Data encryption (Computer science)
    a schema:Intangible ;
   schema:name "Data encryption (Computer science)"@en ;
    .

<http://viaf.org/viaf/22321113> # Peter Loshin
    a schema:Person ;
   schema:familyName "Loshin" ;
   schema:givenName "Peter" ;
   schema:name "Peter Loshin" ;
    .

<http://worldcat.org/entity/work/data/1330338999#CreativeWork/>
    a schema:CreativeWork ;
   schema:description "Print version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/843639624> ; # Simple steps to data encryption : a practical guide to secure computing
    .

<http://worldcat.org/isbn/9780124078826>
    a schema:ProductModel ;
   schema:isbn "0124078826" ;
   schema:isbn "9780124078826" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.