|
books
| book details |
Practical Anonymity: Hiding in Plain Sight Online
By (author) Peter Loshin
|
This book is currently unavailable. Enquire to check if we can source a used copy
|
| book description |
For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be left alone in your online life. ""Practical Anonymity: Hiding in Plain Sight Online ""shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online. This ""practical ""guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible. For many, using any of the open-source, peer-reviewed tools for connecting to the Internet via an anonymous network may be (or seem to be) too difficult becauseamost of the information about these tools is burdened with discussions of how they work and how to maximize security. Even tech-savvy users may find the burden too great--but actually using the tools can be pretty simple. The primary market for this book consists of IT professionals who need/want tools for anonymity to test/work around corporate firewalls and router filtering as well as provide anonymity tools to their customers. Simple, step-by-step instructions for configuring and using anonymous networking software Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats and concrete suggestions for appropriate responses Easy-to-follow tips for safer computing Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats, and concrete suggestions for appropriate responses Easy to follow tips for safer computing.
| product details |
Normally shipped |
Publisher | Elsevier Science Publishing Co Inc
Published date | 14 May 2014
Language |
Format | Digital (delivered electronically)
Pages | 141
Dimensions | 0 x 0 x 0mm (L x W x H)
Weight | 0g
ISBN | 978-0-1241-0442-6
Readership Age |
BISAC | computers / computer science
| other options |
|
|
|
To view the items in your trolley please sign in.
| sign in |
|
|
| specials |
|
Our moment has seen the resurgence of an anarchist sensibility, from the uprisings in Seattle in 1999 to the Occupy movement of 2011.
|
|
André Alexis
Paperback / softback
176 pages
was: R 280.95
now: R 252.95
|
A pack of dogs are granted the power of human thought - but what will it do to them? A surprising and insightful look at the beauty and perils of consciousness.
|
|
Carl Morrow
Paperback / softback
160 pages
was: R 320.95
now: R 288.95
|
In this uniquely Southern African book, Carl Morrow and Keith Kirsten guide readers step by step into the magical realms of bonsai as a hobby, horticultural practice and art form.
|
|
|
|