The Resource The basics of digital privacy : simple tools to protect your personal information and your identity online, Denny Cherry ; technical editor, Thomas LaRock
The basics of digital privacy : simple tools to protect your personal information and your identity online, Denny Cherry ; technical editor, Thomas LaRock
Resource Information
The item The basics of digital privacy : simple tools to protect your personal information and your identity online, Denny Cherry ; technical editor, Thomas LaRock represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item The basics of digital privacy : simple tools to protect your personal information and your identity online, Denny Cherry ; technical editor, Thomas LaRock represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Summary
- Who's watching you online? These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information
- Language
- eng
- Extent
- 1 online resource
- Note
- Includes index
- Contents
-
- Front Cover; The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online; Copyright; Dedication; Acknowledgments; Contents; Author Biography; Introduction; Chapter 1: Storing Your Personal Information Online; Storing your personal information online; How much information you share with companies; Risks of sharing too much information online; Giving attackers the information that they need; Telling thieves when to break into your house; Knowing how companies protect your information; Cookies and websites; InPrivate Browsing
- Turning cookies off in Internet ExplorerTurning cookies off in Firefox; Turning cookies off in Chrome; Turning off cookies in Safari; Summary; Chapter 2: Usernames and Passwords for Websites; Picking a username; Picking a password; How passwords are figured out; Unique passwords; Creating unique passwords; Passphrases; Two-factor authentication; Using fob-based systems; Using software-based two-factor authentication systems; Using a text-messaging-based system; The more important the longer they should be; Summary; Chapter 3: Your Home Network; Securing your home network; Securing your router
- Network address translationNetwork firewalls; Securing your Wi-Fi network; AT & T U-Verse router; D-Link router; NetGear routers; Hiding your wireless network; MAC address filtering; Changing the MAC address in Windows; Changing the MAC address in Apple OS X; Letting others onto your Wi-Fi network; Other devices on the network; Summary; Chapter 4: Securing Your Home Computer; Data encryption for the home user; Native Windows data encryption; Encrypting a disk in Windows; Encrypting a disk in Mac OSX; What do those website security logos mean?; When Tech Support calls you
- Internet games and downloadsApplication stores; Windows antivirus software; Apple computers need antivirus software; Cell phones and tablets; Summary; Chapter 5: Posting Information Online; Kinds of information that shouldnt be posted online; How to protect information that is posted online; Twitter; Facebook; Securing a specific Facebook post; Setting Facebook privacy settings; Flickr; MySpace; Summary; Chapter 6: Who's Watching What You Do?; How can someone watch what I do?; E-mail; Web browsing traffic; Intercepting traffic directly on your machine; Intercepting traffic on the Internet
- How can a government watch what I do?SSL versus the NSA; How can I stop people from watching what I do?; E-mail; Setting up PGP on Microsoft's Outlook 2013; Sending encrypted e-mails; Importing a public key from another person; Web browsing; Consequences; Ease of use; Government scrutiny; Summary; Chapter 7: Laws and Internet Privacy; The law and changing technology; PRISM; Canadian version of PRISM; Is all this legal?; Is all this moral?; Summary; Index
- Isbn
- 9780128001523
- Label
- The basics of digital privacy : simple tools to protect your personal information and your identity online
- Title
- The basics of digital privacy
- Title remainder
- simple tools to protect your personal information and your identity online
- Statement of responsibility
- Denny Cherry ; technical editor, Thomas LaRock
- Subject
-
- COMPUTERS -- Internet | Security
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer Security
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer security
- Computer security
- Computers -- Access control
- Computers -- Access control
- Datensicherung
- Privatsphäre
- Electronic books
- Language
- eng
- Summary
- Who's watching you online? These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information
- Cataloging source
- EBLCP
- http://library.link/vocab/creatorName
- Cherry, Denny
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- LC call number
- QA76.9.A25
- LC item number
- C438 2014eb
- Literary form
- non fiction
- Nature of contents
- dictionaries
- NLM call number
- Online Book
- http://library.link/vocab/relatedWorkOrContributorName
- LaRock, Thomas
- Series statement
- The basics
- http://library.link/vocab/subjectName
-
- Computers
- Computer security
- Computer networks
- Computer Security
- COMPUTERS
- COMPUTERS
- COMPUTERS
- Computer networks
- Computer security
- Computers
- Datensicherung
- Privatsphäre
- Label
- The basics of digital privacy : simple tools to protect your personal information and your identity online, Denny Cherry ; technical editor, Thomas LaRock
- Note
- Includes index
- Antecedent source
- unknown
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Front Cover; The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online; Copyright; Dedication; Acknowledgments; Contents; Author Biography; Introduction; Chapter 1: Storing Your Personal Information Online; Storing your personal information online; How much information you share with companies; Risks of sharing too much information online; Giving attackers the information that they need; Telling thieves when to break into your house; Knowing how companies protect your information; Cookies and websites; InPrivate Browsing
- Turning cookies off in Internet ExplorerTurning cookies off in Firefox; Turning cookies off in Chrome; Turning off cookies in Safari; Summary; Chapter 2: Usernames and Passwords for Websites; Picking a username; Picking a password; How passwords are figured out; Unique passwords; Creating unique passwords; Passphrases; Two-factor authentication; Using fob-based systems; Using software-based two-factor authentication systems; Using a text-messaging-based system; The more important the longer they should be; Summary; Chapter 3: Your Home Network; Securing your home network; Securing your router
- Network address translationNetwork firewalls; Securing your Wi-Fi network; AT & T U-Verse router; D-Link router; NetGear routers; Hiding your wireless network; MAC address filtering; Changing the MAC address in Windows; Changing the MAC address in Apple OS X; Letting others onto your Wi-Fi network; Other devices on the network; Summary; Chapter 4: Securing Your Home Computer; Data encryption for the home user; Native Windows data encryption; Encrypting a disk in Windows; Encrypting a disk in Mac OSX; What do those website security logos mean?; When Tech Support calls you
- Internet games and downloadsApplication stores; Windows antivirus software; Apple computers need antivirus software; Cell phones and tablets; Summary; Chapter 5: Posting Information Online; Kinds of information that shouldnt be posted online; How to protect information that is posted online; Twitter; Facebook; Securing a specific Facebook post; Setting Facebook privacy settings; Flickr; MySpace; Summary; Chapter 6: Who's Watching What You Do?; How can someone watch what I do?; E-mail; Web browsing traffic; Intercepting traffic directly on your machine; Intercepting traffic on the Internet
- How can a government watch what I do?SSL versus the NSA; How can I stop people from watching what I do?; E-mail; Setting up PGP on Microsoft's Outlook 2013; Sending encrypted e-mails; Importing a public key from another person; Web browsing; Consequences; Ease of use; Government scrutiny; Summary; Chapter 7: Laws and Internet Privacy; The law and changing technology; PRISM; Canadian version of PRISM; Is all this legal?; Is all this moral?; Summary; Index
- Control code
- 865332007
- Dimensions
- unknown
- Extent
- 1 online resource
- File format
- unknown
- Form of item
- online
- Isbn
- 9780128001523
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- color illustrations
- http://library.link/vocab/ext/overdrive/overdriveId
-
- 546939
- ab91bae5-3591-4339-8537-2af9138d6cb2
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)865332007
- Label
- The basics of digital privacy : simple tools to protect your personal information and your identity online, Denny Cherry ; technical editor, Thomas LaRock
- Note
- Includes index
- Antecedent source
- unknown
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Front Cover; The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online; Copyright; Dedication; Acknowledgments; Contents; Author Biography; Introduction; Chapter 1: Storing Your Personal Information Online; Storing your personal information online; How much information you share with companies; Risks of sharing too much information online; Giving attackers the information that they need; Telling thieves when to break into your house; Knowing how companies protect your information; Cookies and websites; InPrivate Browsing
- Turning cookies off in Internet ExplorerTurning cookies off in Firefox; Turning cookies off in Chrome; Turning off cookies in Safari; Summary; Chapter 2: Usernames and Passwords for Websites; Picking a username; Picking a password; How passwords are figured out; Unique passwords; Creating unique passwords; Passphrases; Two-factor authentication; Using fob-based systems; Using software-based two-factor authentication systems; Using a text-messaging-based system; The more important the longer they should be; Summary; Chapter 3: Your Home Network; Securing your home network; Securing your router
- Network address translationNetwork firewalls; Securing your Wi-Fi network; AT & T U-Verse router; D-Link router; NetGear routers; Hiding your wireless network; MAC address filtering; Changing the MAC address in Windows; Changing the MAC address in Apple OS X; Letting others onto your Wi-Fi network; Other devices on the network; Summary; Chapter 4: Securing Your Home Computer; Data encryption for the home user; Native Windows data encryption; Encrypting a disk in Windows; Encrypting a disk in Mac OSX; What do those website security logos mean?; When Tech Support calls you
- Internet games and downloadsApplication stores; Windows antivirus software; Apple computers need antivirus software; Cell phones and tablets; Summary; Chapter 5: Posting Information Online; Kinds of information that shouldnt be posted online; How to protect information that is posted online; Twitter; Facebook; Securing a specific Facebook post; Setting Facebook privacy settings; Flickr; MySpace; Summary; Chapter 6: Who's Watching What You Do?; How can someone watch what I do?; E-mail; Web browsing traffic; Intercepting traffic directly on your machine; Intercepting traffic on the Internet
- How can a government watch what I do?SSL versus the NSA; How can I stop people from watching what I do?; E-mail; Setting up PGP on Microsoft's Outlook 2013; Sending encrypted e-mails; Importing a public key from another person; Web browsing; Consequences; Ease of use; Government scrutiny; Summary; Chapter 7: Laws and Internet Privacy; The law and changing technology; PRISM; Canadian version of PRISM; Is all this legal?; Is all this moral?; Summary; Index
- Control code
- 865332007
- Dimensions
- unknown
- Extent
- 1 online resource
- File format
- unknown
- Form of item
- online
- Isbn
- 9780128001523
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- color illustrations
- http://library.link/vocab/ext/overdrive/overdriveId
-
- 546939
- ab91bae5-3591-4339-8537-2af9138d6cb2
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)865332007
Subject
- COMPUTERS -- Internet | Security
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer Security
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer security
- Computer security
- Computers -- Access control
- Computers -- Access control
- Datensicherung
- Privatsphäre
- Electronic books
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/The-basics-of-digital-privacy--simple-tools-to/gL9N6BHzu4E/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/The-basics-of-digital-privacy--simple-tools-to/gL9N6BHzu4E/">The basics of digital privacy : simple tools to protect your personal information and your identity online, Denny Cherry ; technical editor, Thomas LaRock</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item The basics of digital privacy : simple tools to protect your personal information and your identity online, Denny Cherry ; technical editor, Thomas LaRock
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/The-basics-of-digital-privacy--simple-tools-to/gL9N6BHzu4E/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/The-basics-of-digital-privacy--simple-tools-to/gL9N6BHzu4E/">The basics of digital privacy : simple tools to protect your personal information and your identity online, Denny Cherry ; technical editor, Thomas LaRock</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>