Jeżeli nie znalazłeś poszukiwanej książki, skontaktuj się z nami wypełniając formularz kontaktowy.

Ta strona używa plików cookies, by ułatwić korzystanie z serwisu. Mogą Państwo określić warunki przechowywania lub dostępu do plików cookies w swojej przeglądarce zgodnie z polityką prywatności.

Wydawcy

Literatura do programów

Informacje szczegółowe o książce

Desktop Witness: The Dos and Donts of Personal Computer Security - ISBN 9780471486572

Desktop Witness: The Dos and Donts of Personal Computer Security

ISBN 9780471486572

Autor: Michael A. Caloyannides

Wydawca: Wiley

Dostępność: 3-6 tygodni

Cena: 263,55 zł

Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.


ISBN13:      

9780471486572

ISBN10:      

0471486574

Autor:      

Michael A. Caloyannides

Oprawa:      

Paperback

Rok Wydania:      

2002-04-26

Ilość stron:      

384

Wymiary:      

235x188

Tematy:      

UA

Do you trust your computer?
You shouldn′t.
Personal computers are now part of the furniture in homes around the world. We use them for generating, storing and communicating documents and images; we talk to friends and family via email and surf the Web without giving too much thought to the security of our personal information. Unfortunately hacking and computer security are issues which affect all computer users, not just big corporations.
What is a desktop witness?
Your computer stores a record of every document you create, every e–mail you write or receive, which sites you visit on the Internet, even attachments which you don′t open.
An unattended computer may reveal your secrets if you leave security vulnerabilities unattended to. It may ′let in′ outsiders through your IR port. It ′whispers′ behind your back when you are online. Detectable radiation gives away the contents of your screen. Eavesdroppers can hear conversations through your microphone. Your computer remembers everything.
What can you do?
This straight–talking guide, with its easy–to–follow instructions will enable you to regain control and protect your personal information. It will show you the virtues of computer–anonymity, by making you aware of what might motivate people to access your computer in the first place, and it will help you free–up valuable memory by showing you how to really delete the files your computer stores without your knowledge.
A valuable read for any computer user and absolutely essential for any individual, company or practice with information to protect.

Spis treści:
Preface
Acknowledgment
The Need is Very Real: Author′s Perspective
So You Want to Encrypt: Don′t Hurt Your Own Interests by Doing So
Protect What and From Whom? The Answer Determines What You Should and Should Not Do
Effective Protection for Computers Not Connected to Networks
Effective Protection for Computers Connected to the Internet or other Networks
Encrypted Telephony
Legal Issues
In Conclusion
Appendices
Glossary
Index

Nota biograficzna:
MICHAEL A. CALOYANNIDES is a Senior Fellow at Mitretek Systems,Virginia, USA. He is an expert in the fields of information assurance, network security, computer forensics and other related security areas.

Okładka tylna:
Do you trust your computer?
You shouldn′t.
Personal computers are now part of the furniture in homes around the world. We use them for generating, storing and communicating documents and images; we talk to friends and family via email and surf the Web without giving too much thought to the security of our personal information. Unfortunately hacking and computer security are issues which affect all computer users, not just big corporations.
What is a desktop witness?
Your computer stores a record of every document you create, every e–mail you write or receive, which sites you visit on the Internet, even attachments which you don′t open.
An unattended computer may reveal your secrets if you leave security vulnerabilities unattended to. It may ′let in′ outsiders through your IR port. It ′whispers′ behind your back when you are online. Detectable radiation gives away the contents of your screen. Eavesdroppers can hear conversations through your microphone. Your computer remembers everything.
What can you do?
This straight–talking guide, with its easy–to–follow instructions will enable you to regain control and protect your personal information. It will show you the virtues of computer–anonymity, by making you aware of what might motivate people to access your computer in the first place, and it will help you free–up valuable memory by showing you how to really delete the files your computer stores without your knowledge.
A valuable read for any computer user and absolutely essential for any individual, company or practice with information to protect.

Koszyk

Książek w koszyku: 0 szt.

Wartość zakupów: 0,00 zł

ebooks
covid

Kontakt

Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.

Al. Pokoju 29b/22-24

31-564 Kraków


Siedziba Księgarni

ul. Kordylewskiego 1

31-542 Kraków

+48 12 410 5991

+48 12 410 5987

+48 12 410 5989

Zobacz na mapie google

Wyślij e-mail

Subskrypcje

Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.

Autoryzacja płatności

PayU

Informacje na temat autoryzacji płatności poprzez PayU.

PayU banki

© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.

Projekt i wykonanie: Alchemia Studio Reklamy