Protecting Confidential Information: How to Securely Store Sensitive Data

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Protecting Confidential Information: How to Securely Store Sensitive Data by Slava Gomzin, Slava Gomzin
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Slava Gomzin ISBN: 9781476432601
Publisher: Slava Gomzin Publication: April 25, 2012
Imprint: Smashwords Edition Language: English
Author: Slava Gomzin
ISBN: 9781476432601
Publisher: Slava Gomzin
Publication: April 25, 2012
Imprint: Smashwords Edition
Language: English

Booklet for anyone who wants to know how to keep secrets on home computer, or prevent sensitive data from disclosure on office workstation. Topics include: how to break Windows and steal data from computer, pros and cons of using standard Windows data protection mechanisms, several steps to follow in order to keep information secured, using cryptographic solutions for secure storage, and more (Article: ~3,000 words).

Table of Contents includes:

Introduction
How Data is Stolen from Computers
Extensive Security Permissions
Administrators and Users
Administrative Default Network Share - "C$"
Default/Weak Password of Local Administrator Account
Windows XP Repair
Rootkits
Cached Domain Passwords
Trojans and Spyware
Social Engineering Attacks
Stolen Computer or Hard Drive
How to Prevent Confidential Data from Being Stolen
Windows Disk Encryption
Solution
Using TrueCrypt
Resources
About the Author

Slava Gomzin, CISSP, ECSP, Security+ has more than 15 years of professional experience in software development and application security. He is Security Architect at Retalix USA.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Booklet for anyone who wants to know how to keep secrets on home computer, or prevent sensitive data from disclosure on office workstation. Topics include: how to break Windows and steal data from computer, pros and cons of using standard Windows data protection mechanisms, several steps to follow in order to keep information secured, using cryptographic solutions for secure storage, and more (Article: ~3,000 words).

Table of Contents includes:

Introduction
How Data is Stolen from Computers
Extensive Security Permissions
Administrators and Users
Administrative Default Network Share - "C$"
Default/Weak Password of Local Administrator Account
Windows XP Repair
Rootkits
Cached Domain Passwords
Trojans and Spyware
Social Engineering Attacks
Stolen Computer or Hard Drive
How to Prevent Confidential Data from Being Stolen
Windows Disk Encryption
Solution
Using TrueCrypt
Resources
About the Author

Slava Gomzin, CISSP, ECSP, Security+ has more than 15 years of professional experience in software development and application security. He is Security Architect at Retalix USA.

More books from Application Software

Cover of the book Cyberdeterrence and Cyberwar by Slava Gomzin
Cover of the book Aprender Office 2010 con 100 ejercicios prácticos by Slava Gomzin
Cover of the book SAP Query Reporting by Slava Gomzin
Cover of the book Videospiele und Identität(en). Identitätsarbeit in und über digitale Bildschirmspiele by Slava Gomzin
Cover of the book Blogging for Authors: Writing Blogs on Wordpress or Blogger by Slava Gomzin
Cover of the book Integrating 3D Modeling, Photogrammetry and Design by Slava Gomzin
Cover of the book CUCKOO'S EGG by Slava Gomzin
Cover of the book Freemium als Erlösmodell der Spieleindustrie by Slava Gomzin
Cover of the book Public-Key Cryptography – PKC 2019 by Slava Gomzin
Cover of the book Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit by Slava Gomzin
Cover of the book Information Systems Security and Privacy by Slava Gomzin
Cover of the book Kali Linux Hacking Tools Introduction by Slava Gomzin
Cover of the book The Design of Material, Organism, and Minds by Slava Gomzin
Cover of the book Connected Media in the Future Internet Era by Slava Gomzin
Cover of the book Wireless Mobile Internet Security by Slava Gomzin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy