Logo

How to Become Anonymous, Secure and Free Online

Small book cover: How to Become Anonymous, Secure and Free Online

How to Become Anonymous, Secure and Free Online
by

Publisher: Smashwords
ISBN-13: 9780463182154
Number of pages: 151

Description:
This book describes how internet users can become anonymous, secure and free. It gives many free resources and methods for users who want to go anonymous and protect their personal data from being accessed or hacked from outside sources. Ethical concerns for anonymous use are also discussed, along with legal issues that affect freedom and privacy for common citizens who use the internet.

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: Open Source Security Tools: Practical Guide to Security ApplicationsOpen Source Security Tools: Practical Guide to Security Applications
by - Prentice Hall PTR
A practical introduction to open source security tools for IT managers. It reviewes the assortment of free and low-cost solutions for all areas of information security. For each security topic, the best open source tool is analysed.
(16967 views)
Book cover: What If Crime Were Impossible?What If Crime Were Impossible?
by - Univ. of Texas San Antonio
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
(9780 views)
Book cover: Privacy on the Line: The Politics of Wiretapping and EncryptionPrivacy on the Line: The Politics of Wiretapping and Encryption
by - The MIT Press
An insightful study of privacy and security in telecommunications for a post-9/11, post-Patriot Act world. Authors strip away the hype surrounding the policy debate over privacy to examine the national security, commercial and civil liberties issues.
(4092 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(18418 views)