Desktop Witness: The Do's and Don'ts of Personal Computer Security / Edition 1

Desktop Witness: The Do's and Don'ts of Personal Computer Security / Edition 1

by Michael A. Caloyannides
ISBN-10:
0471486574
ISBN-13:
9780471486572
Pub. Date:
07/02/2002
Publisher:
Wiley
ISBN-10:
0471486574
ISBN-13:
9780471486572
Pub. Date:
07/02/2002
Publisher:
Wiley
Desktop Witness: The Do's and Don'ts of Personal Computer Security / Edition 1

Desktop Witness: The Do's and Don'ts of Personal Computer Security / Edition 1

by Michael A. Caloyannides

Paperback

$100.0
Current price is , Original price is $100.0. You
$100.00 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.


Overview

Are you aware of every track, trail, and trace you leave behind every time you use your PC? Are you sure that you really deleted that confidential information from your hard drive?

If not - read this. This book describes the ways in which computer and online privacy can be compromised and gives practical guidance on how to prevent private information from being accessible or retrievable by outside parties or agencies.

This book covers:
* The types of information which are retrievable from a computer and how to prevent leaving sensitive data behind
* How privacy is compromised on the internet (email, web browsing, profiling) and how to combat it
* Full technical details on software for doing computer forensics, defeating computer forensics, encryption, steganography, keystroke capture and detecting keystroke capture

Product Details

ISBN-13: 9780471486572
Publisher: Wiley
Publication date: 07/02/2002
Pages: 384
Product dimensions: 7.50(w) x 9.51(h) x 0.87(d)

About the Author

MICHAEL A. CALOYANNIDES is a Senior Fellow at Mitretek Systems,Virginia, USA. He is an expert in the fields of information assurance, network security, computer forensics and other related security areas.

Table of Contents

Preface

Acknowledgment

The Need is Very Real: Author's Perspective

So You Want to Encrypt: Don't Hurt Your Own Interests by Doing So

Protect What and From Whom? The Answer Determines What You Should and Should Not Do

Effective Protection for Computers Not Connected to Networks

Effective Protection for Computers Connected to the Internet or other Networks

Encrypted Telephony

Legal Issues

In Conclusion

Appendices

Glossary

Index
From the B&N Reads Blog

Customer Reviews