Book description
In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Ano
Table of contents
- Front Cover
- Contents
- Chapter 1: Anonymity in Network Communication (1/3)
- Chapter 1: Anonymity in Network Communication (2/3)
- Chapter 1: Anonymity in Network Communication (3/3)
- Chapter 2: Mix Networks (1/10)
- Chapter 2: Mix Networks (2/10)
- Chapter 2: Mix Networks (3/10)
- Chapter 2: Mix Networks (4/10)
- Chapter 2: Mix Networks (5/10)
- Chapter 2: Mix Networks (6/10)
- Chapter 2: Mix Networks (7/10)
- Chapter 2: Mix Networks (8/10)
- Chapter 2: Mix Networks (9/10)
- Chapter 2: Mix Networks (10/10)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (1/11)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (2/11)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (3/11)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (4/11)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (5/11)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (6/11)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (7/11)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (8/11)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (9/11)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (10/11)
- Chapter 3: Application of Mix Network to E-Voting: a Case Study (11/11)
- Chapter 4: Onion Routing (1/5)
- Chapter 4: Onion Routing (2/5)
- Chapter 4: Onion Routing (3/5)
- Chapter 4: Onion Routing (4/5)
- Chapter 4: Onion Routing (5/5)
- Chapter 5: Optimisation and Practical Application of Onion Routing (1/6)
- Chapter 5: Optimisation and Practical Application of Onion Routing (2/6)
- Chapter 5: Optimisation and Practical Application of Onion Routing (3/6)
- Chapter 5: Optimisation and Practical Application of Onion Routing (4/6)
- Chapter 5: Optimisation and Practical Application of Onion Routing (5/6)
- Chapter 5: Optimisation and Practical Application of Onion Routing (6/6)
- Chapter 6: Practical Systems to Achieve Anonymity: How to Use Them (1/4)
- Chapter 6: Practical Systems to Achieve Anonymity: How to Use Them (2/4)
- Chapter 6: Practical Systems to Achieve Anonymity: How to Use Them (3/4)
- Chapter 6: Practical Systems to Achieve Anonymity: How to Use Them (4/4)
- References (1/2)
- References (2/2)
Product information
- Title: Anonymous Communication Networks
- Author(s):
- Release date: April 2014
- Publisher(s): Auerbach Publications
- ISBN: 9781439881606
You might also like
book
F**k Work, Let’s Play: Do What You Love and Get Paid for It, 2nd Edition
‘A compelling 10-step escape from corporate life that could spell a rash of resignation letters’ – …
book
Practical Threat Intelligence and Data-Driven Threat Hunting
Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and …
book
Learning Malware Analysis
Understand malware analysis and its practical implementation About This Book Explore the key concepts of malware …
book
Computer Security Fundamentals, 5th Edition
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's …