Privacy Protection and Computer Forensics(Artech House Computer Security Series) / Edition 2
by Michael A. Caloyannides
This thoroughly revised edition of an Artech House bestseller goes far beyond the typical computer forensics books on the market, emphasizing how to protect one's privacy from data theft and hostile computer forensics. The second edition has been updated to offer more detailed how-to guidance on protecting the confidentiality of data stored on computers, and
… See more details belowOverview
This thoroughly revised edition of an Artech House bestseller goes far beyond the typical computer forensics books on the market, emphasizing how to protect one's privacy from data theft and hostile computer forensics. The second edition has been updated to offer more detailed how-to guidance on protecting the confidentiality of data stored on computers, and specific information on the vulnerabilities of commonly used ancillary computing devices, such as PDAs, cellular telephones, smart cards, GPS devices, telephone calling cards, fax machines, and photocopiers. This cutting-edge book helps you identify the specific areas where sensitive and potentially incriminating data is hiding in personal computers and consumer electronics, and explains how to go about truly removing this data because mere "deletion" or even "overwriting" does not accomplish this. You get a systematic process for installing operating systems and application software that will help to minimize the possibility of security compromises, and numerous specific steps that need to be taken to prevent the hostile exploitation of one's computer.
Product Details
- ISBN-13:
- 9781580538305
- Publisher:
- Artech House, Incorporated
- Publication date:
- 10/01/2004
- Series:
- Artech House Computer Security Ser.
- Edition description:
- New Edition
- Pages:
- 345
- Product dimensions:
- 6.94(w) x 10.36(h) x 0.93(d)
Table of Contents
The Hype of Computer Forensics - What Is Computer Forensics and Why Is It of Vital Interest to You? Exactly Where Is Potentially Incriminating Data Stored in One's Computer and How Did It Get There. Specialized Forensics Techniques. Fallacies about Protecting One's Computer from Hostile Forensics or Other Theft of Sensitive Data. Computer Privacy and Security - Protecting Proprietary Information from Unauthorized Snooping and from Hostile Computer Forensics. Practical Means of Protecting Proprietary and Other Confidential Information in Computers. Protection from Online Computer Forensics and from Privacy Compromises: Web Browsers and Email. Web-bugs, Adware and Spyware. Security Threats from Using FAX, Telephone Answering Machines, Photocopiers, Digital Cameras, Wi-Fi Wireless Access, Bluetooth Devices. Legal Issues and Evolving Technologies - Legal Issues. Security Aspects of Evolving Technologies.
Customer Reviews
Average Review: