Simple Steps to Data Encryption

Simple Steps to Data Encryption
Author :
Publisher : Newnes
Total Pages : 114
Release :
ISBN-10 : 9780124078826
ISBN-13 : 0124078826
Rating : 4/5 (826 Downloads)

Book Synopsis Simple Steps to Data Encryption by : Peter Loshin

Download or read book Simple Steps to Data Encryption written by Peter Loshin and published by Newnes. This book was released on 2013-04-30 with total page 114 pages. Available in PDF, EPUB and Kindle. Book excerpt: Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard. The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file. There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche. By reading this title readers will be provided with a step by step hands-on guide that includes: - Simple descriptions of actual threat scenarios - Simple, step-by-step instructions for securing data - How to use open source, time-proven and peer-reviewed cryptographic software - Easy to follow tips for safer computing - Unbiased and platform-independent coverage of encryption tools and techniques - Simple descriptions of actual threat scenarios - Simple, step-by-step instructions for securing data - How to use open source, time-proven and peer-reviewed cryptographic software - Easy-to-follow tips for safer computing - Unbiased and platform-independent coverage of encryption tools and techniques


Simple Steps to Data Encryption Related Books

Simple Steps to Data Encryption
Language: en
Pages: 114
Authors: Peter Loshin
Categories: Computers
Type: BOOK - Published: 2013-04-30 - Publisher: Newnes

GET EBOOK

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There i
IBM System i Security: Protecting i5/OS Data with Encryption
Language: en
Pages: 308
Authors: Yessong Johng
Categories: Computers
Type: BOOK - Published: 2008-07-24 - Publisher: IBM Redbooks

GET EBOOK

Regulatory and industry-specific requirements, such as SOX, Visa PCI, HIPAA, and so on, require that sensitive data must be stored securely and protected agains
Getting Started with z/OS Data Set Encryption
Language: en
Pages: 274
Authors: Bill White
Categories: Computers
Type: BOOK - Published: 2021-12-10 - Publisher: IBM Redbooks

GET EBOOK

This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on I
Cloud Security and Privacy
Language: en
Pages: 338
Authors: Tim Mather
Categories: Computers
Type: BOOK - Published: 2009-09-04 - Publisher: "O'Reilly Media, Inc."

GET EBOOK

You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many peo
Securing SQL Server
Language: en
Pages: 274
Authors: Denny Cherry
Categories: Computers
Type: BOOK - Published: 2010-12-27 - Publisher: Elsevier

GET EBOOK

Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases