Freeware Encryption And Security Programs: Protecting Your Computer And Your Privacy

Overview


We are fast approaching a time when all our private communications will be monitored as a matter of course - just in case we might have some criminal intent, politically incorrect thought or uncommon belief. The files we store on our home or work computers and the messages we send over the Internet are fair game for those who would snoop into and record our private lives. The only way most of us can reclaim a modicum of privacy is through file encryption and security programs designed to keep prying eyes away ...
See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (4) from $1.99   
  • New (2) from $65.00   
  • Used (2) from $1.99   
Close
Sort by
Page 1 of 1
Showing 1 – 1 of 2
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$65.00
Seller since 2014

Feedback rating:

(186)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing 1 – 1 of 2
Close
Sort by
Sending request ...

Overview


We are fast approaching a time when all our private communications will be monitored as a matter of course - just in case we might have some criminal intent, politically incorrect thought or uncommon belief. The files we store on our home or work computers and the messages we send over the Internet are fair game for those who would snoop into and record our private lives. The only way most of us can reclaim a modicum of privacy is through file encryption and security programs designed to keep prying eyes away from our secrets. Fortunately, there are many programs that are not only incredibly effective in guarding our privacy but are available absolutely free of charge. In this book, Michael Chesbro (The Complete Guide to E-Security, Privacy for Sale) outlines some of the most popular freeware encryption and security programs available. You will learn how to determine which programs are best for you, how to securely destroy files and the advantages of file sharing. The cost of using these programs is zero. But if you don't learn to use them, it could cost you your privacy or even your freedom.
Read More Show Less

Product Details

  • ISBN-13: 9781581602708
  • Publisher: Paladin Press
  • Publication date: 9/1/2001
  • Pages: 96
  • Product dimensions: 5.40 (w) x 8.40 (h) x 0.40 (d)

Meet the Author


Michael Chesbro is a senior counterintelligence agent with the U.S. Department of Defense. He holds degrees in security management, paralegal studies, and jurisprudence, and is a graduate of the Federal Law Enforcement Training Center. He is professionally certified as a protection officer and as a security supervisor by the International Foundation for Protection Officers. He is a board-certified forensic examiner and a fellow of the American College of Forensic Examiners, as well as a diplomate of the American Board of Forensic Examiners and the American Board of Law Enforcement Experts.
Read More Show Less

Table of Contents

Introduction
Chapter 1: Encryption and the Government
Cryptologic Attack
What Is Freeware?
Chapter 2: Freeware Programs
Pretty Good Privacy (PGP)
Gnu Privacy Guard (GPG)
Security BOX
ABI- CODER
Twofish Lite
Norton Secret Stuff
Iron Key
Kryptel Lite
VGP Encryption Editor
S-Tools-4
Diamond PC1 Cipher-128 and X-Message
Scramdisk
DPCrypto
WinZip 8.0
HushMail
ZipLip
Steganos Online Encryption
Zero-Knowledge Freedom Internet Privacy Suite
Chapter 3: File Sharing and File Destruction
Secure Split
SecureTrayUtil
Eraser
Chapter 4: Passwords
Choosing Secure Passwords
Chapter 5: A Brief Look At Cryptanalysis
Examples of Encrypted Text
Defeating Cryptanalysis
Hash and Cyclic Redundancy Checks
The Encryption Algorithms
Chapter 6: Encryption Systems Not Based on Computers
Transposition Cipher Grid
Keyword Transposition Cipher
Solitaire
One-Time Pads
Chapter 7: My Personal Preferences
Glossary
Bibliography and Selected Reading
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)