- STAFF PICKS
- GIFTS + GIFT CARDS
- SELL BOOKS
- FIND A STORE
This item may be
Check for Availability
Privacy Protection and Computer Forensics (Artech House Computer Security Series)
Synopses & Reviews
This thoroughly revised edition of an Artech House bestseller goes far beyond the typical computer forensics books on the market, emphasizing how to protect one's privacy from data theft and hostile computer forensics. The second edition has been updated to offer more detailed how-to guidance on protecting the confidentiality of data stored on computers, and specific information on the vulnerabilities of commonly used ancillary computing devices, such as PDAs, cellular telephones, smart cards, GPS devices, telephone calling cards, fax machines, and photocopiers. This cutting-edge book helps you identify the specific areas where sensitive and potentially incriminating data is hiding in personal computers and consumer electronics, and explains how to go about truly removing this data because mere "deletion" or even "overwriting" does not accomplish this. You get a systematic process for installing operating systems and application software that will help to minimize the possibility of security compromises, and numerous specific steps that need to be taken to prevent the hostile exploitation of one's computer.
Book News Annotation:
In this guide to computer security, Caloyannides warns readers that "one's PC is the most sought after piece of evidence to be used against one." To combat this invasion, he explains how to identify areas where sensitive data hides in computers and consumer electronics and how to remove that data; how to determine if advanced investigative tools are in use; and other methods of protecting the confidentiality of data stored in computers and ancillary devices, such as PDAs, cell phones and smart cards. He also explains how to use encryption effectively and delineates current legal debates pertaining to the use of computers.
Annotation ©2004 Book News, Inc., Portland, OR (booknews.com)
Now thoroughly revised, this bestseller focuses on protecting one's privacy from data theft, hostile computer forensics, and legal action. It offers detailed "how to" guidance on protecting the confidentiality of data stored on computers and ancillary computing devices, such as PDAs, cellular telephones, and smart cards.
This thoroughly revised edition of a bestseller goes far beyond the typical computer forensics books, emphasizing how to protect one's privacy from data theft, hostile computer forensics, and legal action. It addresses the concerns of today's IT professionals, as well as many users of personal computers, offering more detailed "how to" guidance on protecting the confidentiality of data stored on computers.
What Our Readers Are Saying