This thoroughly revised edition of an Artech House bestseller goes far beyond the typical computer forensics books on the market, emphasizing how to protect one?s privacy from data theft and hostile computer forensics. The second edition has been updated to offer more detailed how-to guidance on protecting the confidentiality of data stored on computers, and specific information on the vulnerabilities of commonly used ancillary computing devices, such as PDAs, cellular telephones, smart cards, GPS devices, telephone calling cards, fax machines, and photocopiers. This cutting-edge book helps you identify the specific areas where sensitive and potentially incriminating data is hiding in personal computers and consumer electronics, and explains how to go about truly removing this data because mere "deletion" or even "overwriting" does not accomplish this. You get a systematic process for installing operating systems and application software that will help to minimize the possibility of security compromises, and numerous specific steps that need to be taken to prevent the hostile exploitation of one?s computer.
This unique resource provides a method for ensuring that computers that are connected to the Internet are protected from malicious mobile code (code that can allow a remote hacker to read, remove, damage, or even add data to one?s computer) the new fashion of "adware/spyware", and "Web bugs." Moreover, you learn how to detect whether advanced investigative tools, such as keystroke storing and relaying hardware and software, are in use in a computer; you also learn of commercially available capabilities for intercepting radio signals unintentionally radiated by a computer. Other critical topics include the pitfalls of encryption and how to use it effectively, the practical aspects of online anonymity, and the current legal issues that pertain to the use of computers.
About the Author
Michael A. Caloyannides is a senior fellow at Mitretek Systems in McLean, VA. He received his Ph.D. in electrical engineering, applied mathematics and philosophy from California Institute of Technology. He is an adjunct professor at two renown universities and a regular columnist and associate editor for IEEE Computer Society?s "Security and Privacy" magazine