|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Peter Loshin (Internet-Standard.com, Arlington, MA, USA) , Peter Loshin (Internet-Standard.com, Arlington, MA, USA) , Peter Loshin (Internet-Standard.com, Arlington, MA, USA) , Peter Loshin (Internet-Standard.com, Arlington, MA, USA)Publisher: Syngress Media,U.S. Imprint: Syngress Media,U.S. Dimensions: Width: 15.20cm , Height: 0.60cm , Length: 22.90cm Weight: 0.160kg ISBN: 9780124114838ISBN 10: 0124114830 Pages: 86 Publication Date: 24 May 2013 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsReviewsSimple Steps to Data Encryption contains just under 100 pages, but those pages are easy to read and contain a lot of useful information.[it] offers a nice introduction to the topic in an approachable and easy to digest manner. --Data and Technology Today blog, July 2, 2013 Computer security specialist Loshin explains how to protect data in motion through the Internet using Gnu Privacy Guard (GnuPG) encryption software, and more briefly how to protect data at rest by using full disk encryption on modern operating systems. --Reference and Research Book News, August 2013 It's a practical, hands-on guide about how to use GnuPG, a command line tool that allows you to protect your data and communications. --Help Net Security online, August 22, 2013 Simple Steps to Data Encryption contains just under 100 pages, but those pages are easy to read and contain a lot of useful information.[it] offers a nice introduction to the topic in an approachable and easy to digest manner. --Data and Technology Today blog, July 2, 2013 .[in Practical Anonymity] Loshin does a decent job of presenting the topic, including why Tor is important, and who it could most benefit. the book [Simple Steps to Data Encryption] starts with an overview of how to use GnuPG (Gnu Privacy Guard). --Slashdot.org, September 30, 2013 This book couldn't have come at a more opportune time...The message here is that everyone can benefit from protecting their information, and you should be doing it as a matter of habit in your everyday life. - Network Security , September 2013 This short book forms an extended manual for the use (and potential mis-use) of GnuPG, a free software for encryption and related tasks.The book discusses the major subtleties involved in using encryption software properly, and refers to additional sources for further reading. --Zentralblatt MATH, 1283, 2014 The author does justice to his title by providing a really simple step-by-step approach for data encryption. The book is restricted to the use of GnuPG software. Any reader wishing to learn how to use this software tool will find the book extremely useful. --ComputingReviews.com, January 23, 2014 The book focuses primarily on GnuPrivacy Guard (GnuPG) and how to use it to protect data in motion. But it also teaches about cryptography and encryption.Simple Steps to Data Encryption offers a nice introduction to the topic in an approachable and easy to digest manner. --Data and Technology Today blog, July 2, 2013 Computer security specialist Loshin explains how to protect data in motion through the Internet using Gnu Privacy Guard (GnuPG) encryption software, and more briefly how to protect data at rest by using full disk encryption on modern operating systems. --Reference and Research Book News, August 2013 It's a practical, hands-on guide about how to use GnuPG, a command line tool that allows you to protect your data and communications. --Help Net Security online, August 22, 2013 Simple Steps to Data Encryption contains just under 100 pages, but those pages are easy to read and contain a lot of useful information.[it] offers a nice introduction to the topic in an approachable and easy to digest manner. --Data and Technology Today blog, July 2, 2013 .[in Practical Anonymity] Loshin does a decent job of presenting the topic, including why Tor is important, and who it could most benefit. the book [Simple Steps to Data Encryption] starts with an overview of how to use GnuPG (Gnu Privacy Guard). --Slashdot.org, September 30, 2013 Author InformationPete Loshin writes and consults about Internet protocols and open source network technologies. Formerly on staff at BYTE Magazine, Information Security Magazine and other publications, his work appears regularly in leading trade publications and websites including CPU, Computerworld, PC Magazine, EarthWeb, Internet.com, and CNN.Pete Loshin, Independent Consultant Tab Content 6Author Website:Countries AvailableAll regions |