Everything you need to know about data encryption to ensure your privacy online!
Chapter 1: Managing Keys Chapter 2: Data Integrity Chapter 3: Data Encryption Chapter 4: Encrypting Drives Chapter 5: Tips and Pointers
Pete Loshin writes and consults about Internet protocols and open source network technologies. Formerly on staff at BYTE Magazine, Information Security Magazine and other publications, his work appears regularly in leading trade publications and websites including CPU, Computerworld, PC Magazine, EarthWeb, Internet.com, and CNN.Pete Loshin, Independent Consultant
"The book focuses primarily on GnuPrivacy Guard (GnuPG) and how to use it to protect data in motion. But it also teaches about cryptography and encryption.Simple Steps to Data Encryption offers a nice introduction to the topic in an approachable and easy to digest manner."--Data and Technology Today blog, July 2, 2013 "Computer security specialist Loshin explains how to protect data in motion through the Internet using Gnu Privacy Guard (GnuPG) encryption software, and more briefly how to protect data at rest by using full disk encryption on modern operating systems."--Reference and Research Book News, August 2013 "It's a practical, hands-on guide about how to use GnuPG, a command line tool that allows you to protect your data and communications."--Help Net Security online, August 22, 2013 "Simple Steps to Data Encryption contains just under 100 pages, but those pages are easy to read and contain a lot of useful information.[it] offers a nice introduction to the topic in an approachable and easy to digest manner."--Data and Technology Today blog, July 2, 2013 ".[in Practical Anonymity] Loshin does a decent job of presenting the topic, including why Tor is important, and who it could most benefit. the book [Simple Steps to Data Encryption] starts with an overview of how to use GnuPG (Gnu Privacy Guard)."--Slashdot.org, September 30, 2013