- Paperback: 284 pages
- Publisher: Apress; 1st ed. edition (July 4, 2017)
- Language: English
- ISBN-10: 1484227980
- ISBN-13: 978-1484227985
- Product Dimensions: 7 x 0.7 x 10 inches
- Shipping Weight: 1.3 pounds (View shipping rates and policies)
- Average Customer Review: 2 customer reviews
- Amazon Best Sellers Rank: #381,155 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Digital Privacy and Security Using Windows: A Practical Guide 1st ed. Edition
Use the Amazon App to scan ISBNs and compare prices.
"Warlight" by Michael Ondaatje
A dramatic coming-of-age story set in the decade after World War II, "Warlight" is the mesmerizing new novel from the best-selling author of "The English Patient." Learn more
Customers who viewed this item also viewed
Customers who bought this item also bought
From the Back Cover
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.
This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows.
Digital Privacy and Security Using Windows offers a comprehensive list of practical digital privacy tutorials in addition to being a complete repository of free online resources and tools assembled in one place. The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird.
What You’ll Learn:
- Know the various parties interested in having your private data
- Differentiate between government and corporate surveillance, and the motivations behind each one
- Understand how online tracking works technically
- Protect digital data, secure online communications, and become anonymous online
- Cover and destroy your digital traces using Windows OS
- Secure your data in transit and at rest
- Be aware of cyber security risks and countermeasures
About the Author
Nihad A. Hassan is an independent information security consultant, digital forensics and cybersecurity expert, online blogger, and book author. He has been actively conducting research on different areas of information security for more than a decade and has developed numerous cybersecurity education courses and technical guides.
Nihad focuses on computer forensics and anti-forensics techniques in Windows OS. He has completed numerous technical security consulting engagements involving security architectures, penetration testing, computer crime investigation, and anti-forensics techniques. Recently, he has shifted his focus toward digital privacy and security.Nihad has authored two books and scores of information security articles in various global publications. He also enjoys being involved in security training, education, and motivation. His current work focuses on digital forensics, anti-forensics techniques, digital privacy, and web security assessment. He covers different information security topics and related matters on his "DarknessGate" infosec blog. Nihad has a BSc honors degree in computer science from the University of Greenwich, United Kingdom.
Rami Hijazi is the General Manager of MERICLER Inc., an education and corporate training firm in Toronto, Canada. He is an experienced IT professional who lectures on a wide array of topics, including object-oriented programming, Java, eCommerce, Agile development, database design, and data handling analysis. Rami also works as consultant to Cyber Boundaries Inc. where he is involved in the design of encryption systems and wireless networks, intrusion detection and data breach tracking, as well as planning and development advice for IT departments concerning contingency planning.
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
Make no mistake, Digital Privacy and Security Using Windows can seem daunting at first. I picked it up and put it back down again at least once. I suggest first reading the table of contents. You will find the subject broken down into manageable units of information. While the chapters do build on themselves, they work very well as standalone modules to be studied and implemented separate from the others. Do read the discussion of the threat situation and then decide how to proceed.
Now that the Equifax hack has made the real world actionable, personally identifiable information of nearly all US adults available to whomever can afford to buy it on the Dark Web, any individual with any privacy concerns will have to protect him or herself. This book will help you do that. Hassan and Hijazi give instructions for anonymous surfing and searching. They explain encryption.
I am told that governments, the US and others, require "backdoors" be put into computing devices sold within that country's borders. In other words, government entities have a way to look at any and all activity on any computing device whatsoever. I do not know if that is true. Our authors even provide a workaround for that reality. See the section on the TAILS OS.
For protection against lesser snooping/hacking/thieving entities, the authors provide clear, step-by-step instructions for hardening ones home networks and endpoints, for making the Windows OS less sieve-like without degrading functionality, and for truly removing old data from our boxes. I've already mentioned their instructions for anonymous surfing and searching and encrypting our files.
The information security ur-myth is this story: Two fellows are threatened by a bear. Before fleeing, one stops to put on sneakers. The other asks, "Will those shoes help you outrun the bear?" The sneaker-shod answers, "I only have to outrun you." Use Hassan and Hijazi's book to be the guy in the track shoes.