The Extreme Searcher’s Internet Handbook: A Guide for the Serious Searcher

Rating: 
Amazon Price: $24.95 $20.53 You save: $4.42 (18%). (as of May 21, 2018 07:56 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

An essential guide for anyone who conducts research on the internet—including librarians, teachers, students, business professionals, and writers—this fully revised handbook details what users must know to take full advantage of internet search tools and resources. From the latest online tools to the new and enhanced services offered by standbys such as Google, the major search engines and their myriad of possibilities are thoroughly discussed. This revamped fourth edition also features chapters on fact-checking sites and popular social networking sites as well as a collection of up-to-date screenshots for visual reference. For those with little to moderate searching experience, friendly, easy-to-follow guidelines to the world of Web research are provided, while experienced searchers will discover new perspectives on content and techniques.

An Introduction to DDoS Attacks and Defense Mechanisms: An Analyst’s Handbook

Rating: 
Amazon Price: $103.00 $103.00 (as of May 22, 2018 04:55 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. The authors' extensive experience in handling denial-of-service attacks and researching defense approaches is laid out clearly in practical, detailed terms.

Hiding from the Internet: Eliminating Personal Online Information

Rating: 
Amazon Price: $29.99 (as of May 22, 2018 01:09 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

New 2016 Third Edition

Take control of your privacy by removing your personal information from the internet with this second edition.
Continue reading “Hiding from the Internet: Eliminating Personal Online Information”

Complete Guide to Internet Privacy, Anonymity & Security

Rating: 
Amazon Price: $9.93 $9.31 You save: $0.62 (6%). (as of May 21, 2018 18:51 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Fully updated and revised, this leading guide on Internet privacy, anonymity and security contains all the practical information you need to inform and protect yourself.

In this comprehensive yet easy-to-read guide for Windows users, you will quickly learn how to: stop search engines, social media and other powerful Internet players from tracking and profiling your online activities gain unrestricted access to all the content and downloads the Internet has to offer use social media to stay connected with friends in ways that don’t compromise your privacy or safety keep hackers, identity thieves and adversaries from gaining access to your computer use the best (and often free!) privacy, anonymity and security apps that really work mask your IP address with a proxy, The Onion Router (Tor) or a virtual private network (VPN) use encryption to keep your digital items, downloads and personal information completely hidden and safe prevent surveillance and the monitoring of your activities by Internet service providers (ISP), governments, adversaries and other unwelcome snoops enjoy all the benefits (and downloads) of torrent file-sharing and Usenet newsgroups while staying protected and anonymous get rid of trace and hidden data on your computer that exposes your private activities conduct checks on how private your online activities and devices really are
Continue reading “Complete Guide to Internet Privacy, Anonymity & Security”

Privacy in Context: Technology, Policy, and the Integrity of Social Life (Stanford Law Books)

Rating: 
Amazon Price: $70.00 $70.00 (as of May 22, 2018 00:22 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself—most people understand that this is crucial to social life —but the inappropriate, improper sharing of information.

Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts—whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.