New ArrivalsEasterClothing, Shoes & AccessoriesHomeKitchen & DiningOutdoor Living & GardenFurnitureGroceryHousehold EssentialsBabyBeautyPersonal CareHealthWellnessBackpacks & LuggageSports & OutdoorsToysElectronicsVideo GamesMovies, Music & BooksSchool & Office SuppliesParty SuppliesGift IdeasGift CardsPetsUlta Beauty at TargetShop by CommunityTarget OpticalDealsClearanceTarget New ArrivalsRoller Rabbit x TargetEasterHome Decor Ideas & TrendsTop DealsTarget Circle DealsWeekly AdShop Order PickupShop Same Day DeliveryRegistryRedCardTarget CircleFind Stores
Simple Steps to Data Encryption - by  Peter Loshin (Paperback) - 1 of 1

Simple Steps to Data Encryption - by Peter Loshin (Paperback)

In Stock

Free & easy returns

Free & easy returns

Return this item by mail or in store within 90 days for a full refund.
Eligible for registries and wish lists
Available deals

Target Circle Deal: Buy 2, get 1 free select books, movies & music

Eligible with Target Circle membership ∙ Expires Mar 27 ∙ Details

About this item

Highlights

  • Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned.
  • Author(s): Peter Loshin
  • 86 Pages
  • Computers + Internet, Information Theory

Description



Book Synopsis



Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography.

Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard.

The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file.

There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche.

By reading this title readers will be provided with a step by step hands-on guide that includes:

  • Simple descriptions of actual threat scenarios
  • Simple, step-by-step instructions for securing data
  • How to use open source, time-proven and peer-reviewed cryptographic software
  • Easy to follow tips for safer computing
  • Unbiased and platform-independent coverage of encryption tools and techniques



Review Quotes




"This book couldn't have come at a more opportune time...The message here is that everyone can benefit from protecting their information, and you should be doing it as a matter of habit in your everyday life." --Network Security, September 1 2013


Dimensions (Overall): 9.0 Inches (H) x 6.0 Inches (W) x .24 Inches (D)
Weight: .36 Pounds
Suggested Age: 22 Years and Up
Number of Pages: 86
Genre: Computers + Internet
Sub-Genre: Information Theory
Publisher: Syngress Publishing
Format: Paperback
Author: Peter Loshin
Language: English
Street Date: April 25, 2013
TCIN: 1008940737
UPC: 9780124114838
Item Number (DPCI): 247-35-7580
Origin: Made in the USA or Imported
If the item details aren’t accurate or complete, we want to know about it.

Shipping details

Estimated ship dimensions: 0.24 inches length x 6 inches width x 9 inches height
Estimated ship weight: 0.36 pounds
We regret that this item cannot be shipped to PO Boxes.
This item cannot be shipped to the following locations: American Samoa (see also separate entry under AS), Guam (see also separate entry under GU), Northern Mariana Islands, Puerto Rico (see also separate entry under PR), United States Minor Outlying Islands, Virgin Islands, U.S., APO/FPO, Alaska, Hawaii

Return details

This item can be returned to any Target store or Target.com.
This item must be returned within 90 days of the date it was purchased in store, delivered to the guest, delivered by a Shipt shopper, or picked up by the guest.
See the return policy for complete information.

Q: What is the main focus of this book?

submitted by AI Shopping Assistant - 8 days ago
  • A: The book focuses on providing practical guidance for ordinary users to securely encrypt their data without needing expert knowledge in cryptography.

    submitted byAI Shopping Assistant - 8 days ago
    Ai generated

Q: Who is the author of this book?

submitted by AI Shopping Assistant - 8 days ago
  • A: The author of the book is Peter Loshin, known for his expertise in computer security and information theory.

    submitted byAI Shopping Assistant - 8 days ago
    Ai generated

Q: What audience is this book aimed at?

submitted by AI Shopping Assistant - 8 days ago
  • A: This book is aimed at average computer users aged 22 and up who seek to protect their personal data.

    submitted byAI Shopping Assistant - 8 days ago
    Ai generated

Q: What type of encryption methods does the book discuss?

submitted by AI Shopping Assistant - 8 days ago
  • A: The book discusses open source, time-proven, and peer-reviewed cryptographic software methods for securing data.

    submitted byAI Shopping Assistant - 8 days ago
    Ai generated

Q: How many pages does this book contain?

submitted by AI Shopping Assistant - 8 days ago
  • A: This book contains a total of 86 pages, offering concise information on data encryption.

    submitted byAI Shopping Assistant - 8 days ago
    Ai generated

Additional product information and recommendations

Discover more options

Practical Anonymity - by  Peter Loshin (Paperback)

$29.95
Buy 2, get 1 free select books, movies & music

Mobile Data Loss - by  Michael T Raggo (Paperback)

$29.95
Buy 2, get 1 free select books, movies & music

Data Breach Preparation and Response - by  Kevvie Fowler (Paperback)

$69.99
Buy 2, get 1 free select books, movies & music

Big Data Analytics - by  David Loshin (Paperback)

$29.95
Buy 2, get 1 free select books, movies & music

Trending Computers & Technology Books

Apple - by  Pogue (Hardcover)

$34.38
was $46.99 New lower price
Buy 2, get 1 free select books, movies & music

Designing Data-Intensive Applications - 2nd Edition by  Martin Kleppmann & Chris Riccomini (Paperback)

$57.39
was $69.99 New lower price
Buy 2, get 1 free select books, movies & music

Planes by Byron Barton (Board Book)

$7.99
Buy 2, get 1 free select books, movies & music
5 out of 5 stars with 1 ratings

Practical Electronics: Components and Techniques - by  J M Hughes (Paperback)

$21.99
MSRP $39.99
Buy 2, get 1 free select books, movies & music

Get top deals, latest trends, and more.

Privacy policy

Footer

About Us

About TargetCareersNews & BlogTarget BrandsBullseye ShopSustainability & GovernancePress CenterAdvertise with UsInvestorsAffiliates & PartnersSuppliersTargetPlus

Help

Target HelpReturnsTrack OrdersRecallsContact UsFeedbackAccessibilitySecurity & FraudTeam Member ServicesLegal & Privacy

Stores

Find a StoreClinicPharmacyTarget OpticalMore In-Store Services

Services

Target Circle™Target Circle™ CardTarget Circle 360™Target AppRegistrySame Day DeliveryOrder PickupDrive UpFree 2-Day ShippingShipping & DeliveryMore Services
PinterestFacebookInstagramXYoutubeTiktokTermsCA Supply ChainPrivacy PolicyCA Privacy RightsYour Privacy ChoicesInterest Based AdsHealth Privacy Policy