Nonfiction » Computers and Internet » Security / cryptography

Easy Password Creation Systems For Life
By Josephine Rosenburgh
Price: $9.99 USD. Words: 4,160. Language: English. Published: April 14, 2014. Category: Nonfiction » Computers and Internet » Security / cryptography
All your passwords satisfied for life: effortlessly create all of the passwords you will need for the rest of your life. Simple. Anyone can do it (almost).
Privacy for Me and Not for Thee: The Movement for Invincible Personal Encryption, Radical State Transparency, and the Snowden Hack
By Catherine Fitzpatrick
Price: $2.99 USD. Words: 84,640. Language: English. Published: January 27, 2014. Category: Nonfiction » Computers and Internet » Security / cryptography
Edward Snowden, the former NSA contractor, perpetrated the greatest assault on American intelligence in US history. Yet his select brotherhood of adversarial journalists, radical activists and anarchist hackers have remained in the shadows. This book brings them to light and challenges their war for absolute encryption even as they demand radical transparency of liberal democracies.
How protect my files pc
By frankie rodriguez
Price: $4.99 USD. Words: 7,130. Language: English. Published: May 27, 2013. Category: Essay » Technology
Fantastic guide that helps you step by step and in a simple way to protect your files, pictures, vodeos and important documents that you have stored on your PC, do not allow third parties access to your information, protect them with this fabulos and amazing guide now .
Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
By Slava Gomzin
Price: $5.99 USD. Words: 2,420. Language: English. Published: July 17, 2012. Category: Nonfiction » Computers and Internet » Security / cryptography
Booklet for IT professionals, developers and security specialists on how to utilize IPSec protocol in order to protect data transmission between legacy applications which were created before secure communication became common practice. In many cases it is difficult or even impossible to make necessary changes in old software in order to implement commonly accepted secure protocols such as SSL/TLS.
Street Cryptography
By Christopher Forrest
Price: $0.99 USD. Words: 8,060. Language: American English. Published: July 7, 2012. Category: Nonfiction » Computers and Internet » Security / cryptography
(4.00 from 1 review)
A quick and easy to use guide on creating your own cipher. This book covers several historic ciphers and builds concepts that will allow you to make one that is reasonably secure.
Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
By Slava Gomzin
Price: $5.99 USD. Words: 3,300. Language: English. Published: June 7, 2012. Category: Nonfiction » Computers and Internet » Security / cryptography
Booklet for anyone who wants to keep their email correspondence private and protect it from unauthorized access. Step-by-step guide explains how to ensure security of email communication by utilizing existing technology.
Protecting Confidential Information: How to Securely Store Sensitive Data
By Slava Gomzin
Price: $5.99 USD. Words: 3,120. Language: English. Published: April 25, 2012. Category: Nonfiction » Computers and Internet » Security / cryptography
Booklet for anyone who wants to know how to keep secrets on home computer, or prevent sensitive data from disclosure on office workstation. Topics include: how to break Windows and steal data from computer, pros and cons of using standard Windows data protection mechanisms, several steps to follow in order to keep information secured, using cryptographic solutions for secure storage, and more
Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless
By Slava Gomzin
Price: $5.99 USD. Words: 2,950. Language: English. Published: April 24, 2012. Category: Nonfiction » Computers and Internet » Internet / security
Booklet for anyone who wants to keep private and free of censorship Internet access. Step-by-step guide explains how to ensure security on public wireless network, escape the corporate firewall loggers, and avoid Internet proxy filters.
Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build
By Slava Gomzin
Price: $5.99 USD. Words: 4,840. Language: English. Published: April 22, 2012. Category: Nonfiction » Computers and Internet » Security / cryptography
Booklet for developers and security professionals on how to implement code obfuscation, .NET strong name signing, and Authenticode code signing in order to protect applications deployment. The guide contains detailed description of different code signing implementation options from basic software to sophisticated hardware solution.