Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Title page
Copyright page
Table of Contents
Prologue
Axioms of Digital Communication
1. If in Doubt: Best Not to Do It
2. Make Your Legal Name a Scarce Commodity
3. Business and Personal – Two Separate Worlds
4. Is That Really You?
5. Keeping Correspondence Private in Modern Times
6. Do Not Put the Fox in Charge of the Henhouse
7. Digital Eyes are Everywhere
8. Keeping Intruders Out
9. The Right Lid for Every Pot
10. Open Sesame!
11. Now, Where Did I Put That Key?
12. Who’s Looking Over My Shoulder?
Customize Your Infrastructure to Ensure Your Privacy
13. Lock the Door Behind You
14. Offline Storage
15. High in the Clouds …
16. Digital Blackmailing
17. Avoiding Data Loss
18. Sweeping Dirt Under the Rug
19. Dirt On the Rug
20. Invisible Ghosts
21. Getting a Second Chance
Using Devices Correctly
22. Backdoors and Greedy Data Collectors
23. Getting Rid of the Clutter
24. E-mail from the Fridge
25. Over and Out
26. Just Between the Two of Us
27. Inadvertent Sharing
28. Ineffective Lock Screens
29. Following Every Step You Take
30. Appmania
31. Chattanooga
Communicating Online
32. A Photo Travels Around the Globe …
33. Snapchat Hack
34. White Gorillas in Mongolia
35. Surfing in the Right Mode
36. Secure Surfing
37. Marking Your Presence
38. Well-set
39. My Name is Blonde…
40. Your Professional Profile
41. Digital Billboard
42. Interesting – That’s What He Did Last...
43. Pressure to Communicate
44. Using Other People’s Devices
45. Smile!
46. Face Recognition
47. Paytime!
48. Care for a Few Chips?
49. The Innermost Circle
In Closing
50. Checking Your Data Traces
51. There’s No Facebook in Heaven (Yet)
52. Privacy Fitness Program
Epilogue
Back cover
← Prev
Back
Next →
← Prev
Back
Next →