Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Record 7 of 18
Previous Record Next Record
Electronic Book
Author Loshin, Peter.

Title Simple steps to data encryption : a practical guide to secure computing / Peter Loshin.

Imprint Burlington : Elsevier Science, 2013.

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Description 1 online resource
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Summary Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what.
Note Print version record.
Contents Front Cover; Simple Steps to Data Encryption; Copyright page; Contents; To the Reader; Preface: What Is This?; What Is Cryptography?; What Can Cryptography Do?; Basic Cryptographic Functions; Does "Secret" Mean the Same as "Private"?; What Else Do I Need?; What OS Should I Use?; How Do I Do All This Stuff?; Introduction; 1 Using Gnu Privacy Guard; 1.1 Keeping Data Secret, for a Novice GnuPG User; 1.2 The Simplest Example: GnuPG Symmetric Encrypting Text; 1.3 Decrypting a File (Symmetric Key); 1.4 Encrypting Interactively; 1.5 ASCII Armor; 1.6 Command Summary and Review; 1.7 Review Questions.
2 Selected FAQs on Using GnuPG2.1 Why Use GnuPG; 2.2 Why Start with the Command Line; 2.3 Why Use the Command Line; 2.4 Getting to the Command Line; 2.5 Is GnuPG Even Installed?; 2.6 GnuPG Commands and Options; 2.7 Simple Examples; 2.8 Options: Getting More Information; 2.9 Options: Text or Binary; 2.10 Command Summary and Review; 2.11 Review Questions; 3 Public Keys; 3.1 Getting Someone's Public Key; 3.2 Generating a Public Key; 3.3 Why Two Key Pairs?; 3.4 Key Length; 3.5 Key Expiration and Key Revocation; 3.6 Reasons for Key Revocation; 3.7 Generating a Public Key Pair, Completed.
3.8 Exporting a Public Key3.9 Command Summary and Review; 3.10 Review Questions; 4 Public Key Functions; 4.1 Decrypting and Verifying; 4.1.1 Pinentry Dialog Box and RAM Caching; 4.1.2 Storing ASCII-Armored Text in a File; 4.2 Web of Trust; 4.2.1 Signing a Key; 4.3 Encrypt and Sign; 4.4 Benefits of Digital Signatures; 4.5 Command Summary and Review; 4.6 Review Questions; 5 More About Signatures; 5.1 "Decrypting" a Digital Signature; 5.2 More About Signatures; 5.3 Digital Signature Types; 5.4 Signing and Verifying, Summarized; 5.4.1 Verifying a Digitally Signed File (Attached Signature)
5.5 Review Questions6 Working with Public Keys; 6.1 Trusting a Public Key; 6.1.1 Using Fingerprints; 6.1.2 Other Ways of Verifying a Public Key; 6.1.3 Fingerprints; 6.2 Using Keyservers; 6.3 Review Questions; 7 Editing and Revoking a Public Key; 7.1 Editing Keys; 7.2 Revoking a Key; 7.2.1 The Revocation Process; 7.2.2 Creating the Revocation Certificate; 7.2.3 Revoking a Key; 7.2.4 A Different Way to Revoke; 7.3 Command Summary and Review; 7.4 Review Questions; 8 Security Practices and Tips; 8.1 Verifying Software Downloads; 8.1.1 Verifying a Download With a Hash Value.
8.1.2 Calculating a Hash Value on Different OSes8.2 Passphrases: Doing Them Right; 8.3 Dangers of RAM Cache and Other System Artifacts; 8.4 Full Disk Encryption; 8.4.1 How Good Is FDE?; 8.5 Encrypting Your System Hard Drive FAQ; 8.5.1 How it Works; 8.5.2 Enabling FDE; 8.5.3 About Microsoft BitLocker; 8.5.4 About Apple FileVault; 8.5.5 About TrueCrypt; Postscript.
Subject Data encryption (Computer science)
Computer security.
Chiffrement (Informatique)
Sécurité informatique.
COMPUTERS -- Security -- Cryptography.
Computer security
Data encryption (Computer science)
Engineering & Applied Sciences.
Computer Science.
Other Form: Print version: 9780124114838
ISBN 9780124078826 (electronic bk.)
0124078826 (electronic bk.)
9780124114838
0124114830
Standard No. AU@ 000051860480
DEBBG BV042314321
DEBSZ 405348258
NZ1 15193689
CHNEW 001011180

 
    
Available items only