
Practical Anonymity : Hiding in Plain Sight Online
Free delivery worldwide
Available.
Dispatched from the UK in 3 business days
When will my order arrive?
Description
For many, using any of the open-source, peer-reviewed tools for connecting to the Internet via an anonymous network may be (or seem to be) too difficult because most of the information about these tools is burdened with discussions of how they work and how to maximize security. Even tech-savvy users may find the burden too great--but actually using the tools can be pretty simple.
The primary market for this book consists of IT professionals who need/want tools for anonymity to test/work around corporate firewalls and router filtering as well as provide anonymity tools to their customers.
Simple, step-by-step instructions for configuring and using anonymous networking software
Simple, step-by-step instructions for configuring and using anonymous networking software
Use of open source, time-proven and peer-reviewed tools for anonymity
Plain-language discussion of actual threats and concrete suggestions for appropriate responses
Easy-to-follow tips for safer computing
show more
Product details
- Paperback | 128 pages
- 149.86 x 223.52 x 12.7mm | 204.12g
- 12 Aug 2013
- Syngress Media,U.S.
- Rockland, MA, United States
- English
- black & white illustrations
- 0124104045
- 9780124104044
- 1,763,173
Other books in this series
Malware Forensics Field Guide for Windows Systems
31 Jul 2012
Paperback
US$54.22 US$59.94
Save US$5.72
Designing and Building Security Operations Center
20 Nov 2014
Paperback
US$48.25 US$49.94
Save US$1.69
Table of contents
Chapter 2: Securing the Computer
Chapter 3: Securing the Network
Chapter 4: Using an Onion-Routed Network
Chapter 5: Hidden Services
Chapter 6: Anonymous Email and other Resources
show more
Review quote
"Loshin, a cybersecurity expert, introduces the Tor Project and Tor Browser Bundle, an open-source solution for those with a legitimate reason to maintain anonymity or circumvent censorship on the Internet. He includes diagrams showing how the Tor network works, tips for e-mailing anonymously, and resources." --Reference & Research Book News, October 2013
"...the book is easy to read and reasonably well organized. The coverage of Tor is very complete and far easier to read than the Tor documentation... If you are moderately technical and are looking for a book on the capabilities of Tor, then this is a good book to start with." --Escaped...from a Twisted Mind blog, September 2013
"...[in Practical Anonymity] Loshin does a decent job of presenting the topic, including why Tor is important, and who it could most benefit... the book [Simple Steps to Data Encryption] starts with an overview of how to use GnuPG (Gnu Privacy Guard)." --Slashdot.org, September 2013
show more
About Peter Loshin
show more