49,95 €
49,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
25 °P sammeln
49,95 €
49,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
25 °P sammeln
Als Download kaufen
49,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
25 °P sammeln
Jetzt verschenken
49,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
25 °P sammeln
  • Format: ePub

This book examines anonymous communication networks as a solution to Internet privacy concerns. It explores various anonymous communication networks as possible solutions to Internet privacy concerns and identifies specific scenarios where it is best to remain anonymous. The text details the two main approaches to anonymous communication networks: onion routing and mixed networks. Using examples and case studies, it illustrates the usefulness of anonymous communication networks for web browsing, email, e-banking, and e-voting. It also includes guidance to help readers download and install Tor, I2P, JAP/JonDo, and QuickSilver.…mehr

  • Geräte: eReader
  • ohne Kopierschutz
  • eBook Hilfe
  • Größe: 2.05MB
Produktbeschreibung
This book examines anonymous communication networks as a solution to Internet privacy concerns. It explores various anonymous communication networks as possible solutions to Internet privacy concerns and identifies specific scenarios where it is best to remain anonymous. The text details the two main approaches to anonymous communication networks: onion routing and mixed networks. Using examples and case studies, it illustrates the usefulness of anonymous communication networks for web browsing, email, e-banking, and e-voting. It also includes guidance to help readers download and install Tor, I2P, JAP/JonDo, and QuickSilver.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Dr. Kun Peng received his bachelor's degree in software and master's degree in computer security from Huazhong University of Science and Technology, China. He graduated from the Information Security Institute, Queensland University of Technology, Australia, in 2004, obtaining his PhD degree in information security. His main research interest is in applied public key cryptology. His main research interests include applied cryptology, network security, secure e-commerce, and e-government.