Reviews
"Computer security specialist Loshin explains how to protect data in motion through the Internet using Gnu Privacy Guard (GnuPG) encryption software, and more briefly how to protect data at rest by using full disk encryption on modern operating systems." --Reference and Research Book News, August 2013 "It's a practical, hands-on guide about how to use GnuPG, a command line tool that allows you to protect your data and communications."-- Help Net Security online, August 22, 2013 " Simple Steps to Data Encryption contains just under 100 pages, but those pages are easy to read and contain a lot of useful information.[it] offers a nice introduction to the topic in an approachable and easy to digest manner."-- Data and Technology Today blog, July 2, 2013, "Computer security specialist Loshin explains how to protect data in motion through the Internet using Gnu Privacy Guard (GnuPG) encryption software, and more briefly how to protect data at rest by using full disk encryption on modern operating systems." --Reference and Research Book News, August 2013 "It's a practical, hands-on guide about how to use GnuPG, a command line tool that allows you to protect your data and communications."-- Help Net Security online, August 22, 2013 " Simple Steps to Data Encryption contains just under 100 pages, but those pages are easy to read and contain a lot of useful information.[it] offers a nice introduction to the topic in an approachable and easy to digest manner."-- Data and Technology Today blog, July 2, 2013 ".[in Practical Anonymity] Loshin does a decent job of presenting the topic, including why Tor is important, and who it could most benefit. the book [Simple Steps to Data Encryption] starts with an overview of how to use GnuPG (Gnu Privacy Guard)."-- Slashdot.org, September 30, 2013, "This short book forms an extended manual for the use (and potential mis-use) of GnuPG, a free software for encryption and related tasks.The book discusses the major subtleties involved in using encryption software properly, and refers to additional sources for further reading."-- Zentralblatt MATH, 1283, 2014 "The author does justice to his title by providing a really simple step-by-step approach for data encryption. The book is restricted to the use of GnuPG software. Any reader wishing to learn how to use this software tool will find the book extremely useful."-- ComputingReviews.com, January 23, 2014 "The book focuses primarily on GnuPrivacy Guard (GnuPG) and how to use it to protect data in motion. But it also teaches about cryptography and encryption.Simple Steps to Data Encryption offers a nice introduction to the topic in an approachable and easy to digest manner."-- Data and Technology Today blog, July 2, 2013 "Computer security specialist Loshin explains how to protect data in motion through the Internet using Gnu Privacy Guard (GnuPG) encryption software, and more briefly how to protect data at rest by using full disk encryption on modern operating systems." --Reference and Research Book News, August 2013 "It's a practical, hands-on guide about how to use GnuPG, a command line tool that allows you to protect your data and communications."-- Help Net Security online, August 22, 2013 " Simple Steps to Data Encryption contains just under 100 pages, but those pages are easy to read and contain a lot of useful information.[it] offers a nice introduction to the topic in an approachable and easy to digest manner."-- Data and Technology Today blog, July 2, 2013 ".[in Practical Anonymity] Loshin does a decent job of presenting the topic, including why Tor is important, and who it could most benefit. the book [Simple Steps to Data Encryption] starts with an overview of how to use GnuPG (Gnu Privacy Guard)."-- Slashdot.org, September 30, 2013, " Simple Steps to Data Encryption contains just under 100 pages, but those pages are easy to read and contain a lot of useful information.[it] offers a nice introduction to the topic in an approachable and easy to digest manner."-- Data and Technology Today blog, July 2, 2013, "The book focuses primarily on GnuPrivacy Guard (GnuPG) and how to use it to protect data in motion. But it also teaches about cryptography and encryption.Simple Steps to Data Encryption offers a nice introduction to the topic in an approachable and easy to digest manner."-- Data and Technology Today blog, July 2, 2013 "Computer security specialist Loshin explains how to protect data in motion through the Internet using Gnu Privacy Guard (GnuPG) encryption software, and more briefly how to protect data at rest by using full disk encryption on modern operating systems." --Reference and Research Book News, August 2013 "It's a practical, hands-on guide about how to use GnuPG, a command line tool that allows you to protect your data and communications."-- Help Net Security online, August 22, 2013 " Simple Steps to Data Encryption contains just under 100 pages, but those pages are easy to read and contain a lot of useful information.[it] offers a nice introduction to the topic in an approachable and easy to digest manner."-- Data and Technology Today blog, July 2, 2013 ".[in Practical Anonymity] Loshin does a decent job of presenting the topic, including why Tor is important, and who it could most benefit. the book [Simple Steps to Data Encryption] starts with an overview of how to use GnuPG (Gnu Privacy Guard)."-- Slashdot.org, September 30, 2013