Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Data encryption is a powerful tool, if used properly. This title provides with a step by step hands-on guide that includes: simple descriptions of actual threat scenarios; simple, step-by-step instructions for securing data; how to use open source, time-proven and peer-reviewed cryptographic software; and easy to follow tips for safer computing.
A guide that skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible. It features step-by-step instructions for configuring and using anonymous networking software.
Explores TCP/IP networking that can benefit newcomers and veterans alike. This book reflects technological changes, including the Stream Control Transmission Protocol (SCTP), the Blocks architecture for application protocols, and the Transport Layer Security Protocol (TLS).
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.