Protecting Confidential Information: How to Securely Store Sensitive Data Protecting Confidential Information: How to Securely Store Sensitive Data

Protecting Confidential Information: How to Securely Store Sensitive Data

How to Securely Store Sensitive Data

    • 1.0 • 1 Rating
    • $3.99
    • $3.99

Publisher Description

Booklet for anyone who wants to know how to keep secrets on home computer, or prevent sensitive data from disclosure on office workstation. Topics include: how to break Windows and steal data from computer, pros and cons of using standard Windows data protection mechanisms, several steps to follow in order to keep information secured, using cryptographic solutions for secure storage, and more (Article: ~3,000 words).

Table of Contents includes:

Introduction
How Data is Stolen from Computers
Extensive Security Permissions
Administrators and Users
Administrative Default Network Share - "C$"
Default/Weak Password of Local Administrator Account
Windows XP Repair
Rootkits
Cached Domain Passwords
Trojans and Spyware
Social Engineering Attacks
Stolen Computer or Hard Drive
How to Prevent Confidential Data from Being Stolen
Windows Disk Encryption
Solution
Using TrueCrypt
Resources
About the Author

Slava Gomzin, CISSP, ECSP, Security+ has more than 15 years of professional experience in software development and application security. He is Security Architect at Retalix USA.

GENRE
Computers & Internet
RELEASED
2012
April 25
LANGUAGE
EN
English
LENGTH
14
Pages
PUBLISHER
Slava Gomzin
SELLER
Draft2Digital, LLC
SIZE
575.7
KB

Customer Reviews

Edwill ,

Don’t waste the $5

Totally disappointing. The book has only about 10 pages. The rest is infomercials for other books.

48 Tips Everyone Should Know 48 Tips Everyone Should Know
2012
Microsoft Windows Security Essentials Microsoft Windows Security Essentials
2011
Learn Computer Security Learn Computer Security
2020
Easy Guide to Cybersecurity & Privacy Easy Guide to Cybersecurity & Privacy
2019
Cybersecurity for Everyone Cybersecurity for Everyone
2014
Compsec: For the Home User Compsec: For the Home User
2015
Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless
2012
Hacking Point of Sale Hacking Point of Sale
2014
Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
2012
Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server
2012
Bitcoin for Nonmathematicians Bitcoin for Nonmathematicians
2016
Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
2012