Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Data encryption is a powerful tool, if used properly. This title provides with a step by step hands-on guide that includes: simple descriptions of actual threat scenarios; simple, step-by-step instructions for securing data; how to use open source, time-proven and peer-reviewed cryptographic software; and easy to follow tips for safer computing.
A guide that skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible. It features step-by-step instructions for configuring and using anonymous networking software.
Explores TCP/IP networking that can benefit newcomers and veterans alike. This book reflects technological changes, including the Stream Control Transmission Protocol (SCTP), the Blocks architecture for application protocols, and the Transport Layer Security Protocol (TLS).
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.