Description |
xix, 345 pages : illustrations ; 26 cm |
Series |
Artech House computer security series |
|
Artech House computer security series.
|
Contents |
1. Computer forensics -- 2. Locating your sensitive data in your computer -- 3. Specialized forensics applications -- 4. How can sensitive data be stolen from one's computer? -- 5. Why computer privacy and anonymity? -- 6. Practical measures for protecting sensitive information -- 7. Basic protection from computer data theft online -- 8. Practical measures for online computer activities -- 9. Advanced protection from computer data theft online -- 10. Encryption -- 11. Practical encryption -- 12. Link encryption : VPNs -- 13. Security of wireless connectivity : Wi-Fi and Bluetooth -- 14. Other computer-related threats to privacy -- 15. Biometrics : privacy versus nonrepudiation -- 16. Legal issues |
Summary |
"This revised edition of an Artech House bestseller goes far beyond the typical computer forensics books on the market, emphasizing how to protect one's privacy from data theft and hostile computer forensics. The second edition has been updated to offer more detailed how-to guidance on protecting the confidentiality of data stored on computers, and specific information on the vulnerabilities of commonly used ancillary computing devices, such as PDAs, cellular telephones, smart cards, GPS devices, telephone calling cards, fax machines, and photocopiers."--BOOK JACKET |
Notes |
Rev. ed of: Computer forensics and privacy. 2001 |
Bibliography |
Includes bibliographical references and index |
Subject |
Computer security.
|
|
Data protection.
|
|
Forensic sciences.
|
Author |
Caloyannides, Michael A.
Computer forensics and privacy
|
LC no. |
2004052957 |
ISBN |
1580538304 (hbk.) |
|