Privacy Protection and Computer Forensics(Artech House Computer Security Series) / Edition 2

Privacy Protection and Computer Forensics(Artech House Computer Security Series) / Edition 2

by Michael A. Caloyannides
     
 

ISBN-10: 1580538304

ISBN-13: 9781580538305

Pub. Date: 10/01/2004

Publisher: Artech House, Incorporated

This thoroughly revised edition of an Artech House bestseller goes far beyond the typical computer forensics books on the market, emphasizing how to protect one's privacy from data theft and hostile computer forensics. The second edition has been updated to offer more detailed how-to guidance on protecting the confidentiality of data stored on computers, and

…  See more details below

Overview

This thoroughly revised edition of an Artech House bestseller goes far beyond the typical computer forensics books on the market, emphasizing how to protect one's privacy from data theft and hostile computer forensics. The second edition has been updated to offer more detailed how-to guidance on protecting the confidentiality of data stored on computers, and specific information on the vulnerabilities of commonly used ancillary computing devices, such as PDAs, cellular telephones, smart cards, GPS devices, telephone calling cards, fax machines, and photocopiers. This cutting-edge book helps you identify the specific areas where sensitive and potentially incriminating data is hiding in personal computers and consumer electronics, and explains how to go about truly removing this data because mere "deletion" or even "overwriting" does not accomplish this. You get a systematic process for installing operating systems and application software that will help to minimize the possibility of security compromises, and numerous specific steps that need to be taken to prevent the hostile exploitation of one's computer.

Read More

Product Details

ISBN-13:
9781580538305
Publisher:
Artech House, Incorporated
Publication date:
10/01/2004
Series:
Artech House Computer Security Ser.
Edition description:
New Edition
Pages:
345
Product dimensions:
6.94(w) x 10.36(h) x 0.93(d)

Table of Contents

The Hype of Computer Forensics - What Is Computer Forensics and Why Is It of Vital Interest to You? Exactly Where Is Potentially Incriminating Data Stored in One's Computer and How Did It Get There. Specialized Forensics Techniques. Fallacies about Protecting One's Computer from Hostile Forensics or Other Theft of Sensitive Data. Computer Privacy and Security - Protecting Proprietary Information from Unauthorized Snooping and from Hostile Computer Forensics. Practical Means of Protecting Proprietary and Other Confidential Information in Computers. Protection from Online Computer Forensics and from Privacy Compromises: Web Browsers and Email. Web-bugs, Adware and Spyware. Security Threats from Using FAX, Telephone Answering Machines, Photocopiers, Digital Cameras, Wi-Fi Wireless Access, Bluetooth Devices. Legal Issues and Evolving Technologies - Legal Issues. Security Aspects of Evolving Technologies.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >