DESKTOP WITNESS - THE DO'S AND DON'TS OF PERSONAL COMPUTER SECURITY
商品資訊
ISBN13:9780471486572
出版社:JOHN WILEY & SONS;LTD
作者:CALOYANNIDES
出版日:2002/04/26
裝訂/頁數:平裝/384頁
定價
:NT$ 3800 元優惠價
:
90 折 3420 元
絕版無法訂購
商品簡介
作者簡介
目次
商品簡介
Are you aware of every track, trail, and trace you leave behind every time you use your PC? Are you sure that you really deleted that confidential information from your hard drive?
If not - read this. This book describes the ways in which computer and online privacy can be compromised and gives practical guidance on how to prevent private information from being accessible or retrievable by outside parties or agencies.
This book covers:
* The types of information which are retrievable from a computer and how to prevent leaving sensitive data behind
* How privacy is compromised on the internet (email, web browsing, profiling) and how to combat it
* Full technical details on software for doing computer forensics, defeating computer forensics, encryption, steganography, keystroke capture and detecting keystroke capture
If not - read this. This book describes the ways in which computer and online privacy can be compromised and gives practical guidance on how to prevent private information from being accessible or retrievable by outside parties or agencies.
This book covers:
* The types of information which are retrievable from a computer and how to prevent leaving sensitive data behind
* How privacy is compromised on the internet (email, web browsing, profiling) and how to combat it
* Full technical details on software for doing computer forensics, defeating computer forensics, encryption, steganography, keystroke capture and detecting keystroke capture
作者簡介
MICHAEL A. CALOYANNIDES is a Senior Fellow at Mitretek Systems,Virginia, USA. He is an expert in the fields of information assurance, network security, computer forensics and other related security areas.
目次
Preface
Acknowledgment
The Need is Very Real: Author's Perspective
So You Want to Encrypt: Don't Hurt Your Own Interests by Doing So
Protect What and From Whom? The Answer Determines What You Should and Should Not Do
Effective Protection for Computers Not Connected to Networks
Effective Protection for Computers Connected to the Internet or other Networks
Encrypted Telephony
Legal Issues
In Conclusion
Appendices
Glossary
Index
Acknowledgment
The Need is Very Real: Author's Perspective
So You Want to Encrypt: Don't Hurt Your Own Interests by Doing So
Protect What and From Whom? The Answer Determines What You Should and Should Not Do
Effective Protection for Computers Not Connected to Networks
Effective Protection for Computers Connected to the Internet or other Networks
Encrypted Telephony
Legal Issues
In Conclusion
Appendices
Glossary
Index
主題書展
更多
主題書展
更多書展購物須知
外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。
無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。
為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。
若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

