Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
DIGITAL PRIVACY: IN A WORLD OF HIGH-TECH SURVEILLANCE
by
Shaw, C. Mitchell
in
Computer privacy
/ Data encryption
/ Electronic mail systems
/ Government agencies
/ Internet service providers
/ Linux
/ Open source software
/ Operating systems
/ Privacy
/ Public domain
/ Services
/ Smartphones
/ Snowden, Edward Joseph
/ Social networks
/ Surveillance
/ Video teleconferencing
/ Wireless communication systems
2023
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
DIGITAL PRIVACY: IN A WORLD OF HIGH-TECH SURVEILLANCE
by
Shaw, C. Mitchell
in
Computer privacy
/ Data encryption
/ Electronic mail systems
/ Government agencies
/ Internet service providers
/ Linux
/ Open source software
/ Operating systems
/ Privacy
/ Public domain
/ Services
/ Smartphones
/ Snowden, Edward Joseph
/ Social networks
/ Surveillance
/ Video teleconferencing
/ Wireless communication systems
2023
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
DIGITAL PRIVACY: IN A WORLD OF HIGH-TECH SURVEILLANCE
by
Shaw, C. Mitchell
in
Computer privacy
/ Data encryption
/ Electronic mail systems
/ Government agencies
/ Internet service providers
/ Linux
/ Open source software
/ Operating systems
/ Privacy
/ Public domain
/ Services
/ Smartphones
/ Snowden, Edward Joseph
/ Social networks
/ Surveillance
/ Video teleconferencing
/ Wireless communication systems
2023
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Journal Article
DIGITAL PRIVACY: IN A WORLD OF HIGH-TECH SURVEILLANCE
2023
Request Book From Autostore
and Choose the Collection Method
Overview
How can ordinary people protect themselves from high-tech government busybodies? Since the internet touches almost every area of our public and private lives, internet privacy is an important guiding principle. Open-source software is licensed in such a way that its source code is available for anyone to view, audit, modify, and redistribute. Because the open-source community is so large and diverse, the likelihood of anything nefarious being hidden in the code is at or near zero. [...]given that the source codes of proprietary software are closely guarded secrets, it is impossible to be certain that such software does not contain back doors. Because of this, this writer recommends using only open-source software whenever possible. While the files are in this state, they are unreadable and are only reassembled into something readable by a key that is activated by the correct passphrase. Since unencrypted information is impossible to secure, this writer recommends encrypting everything you can.
This website uses cookies to ensure you get the best experience on our website.