Are you aware of every track, trail, and trace you leave behind every time you use your PC? Are you sure that you really deleted that confidential information from your hard drive? If not - read this. This book describes the ways in which computer and online privacy can be compromised and gives practical guidance on how to prevent private information from being accessible or retrievable by outside parties or agencies. This book covers: * The types of information which are retrievable from a computer and how to prevent leaving sensitive data behind * How privacy is compromised on the internet (email, web browsing, profiling) and how to combat it * Full technical details on software for doing computer forensics, defeating computer forensics, encryption, steganography, keystroke capture and detecting keystroke capture
This is a great subject area, but I wish that it had more details. I prefer the cookbook style that walks you through actual examples of implementation rather than the general descriptions in this book.
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.