Some Special Fields of Data Security
In: Symposium for Young Researchers 2007: Proceedings
Our age is called information age which shows the importance of any kind of data. Because of this one should protect their (digital) data to prevent non-wanted entities accessing them.This is a permanent problem of enterprises and private persons as well. The technical prerequisites are given not only for eavesdropping the data of others but for securing our data as well. In this paper I show a possible and a low cost technical solution for a typical situation: how one can hide the digital footprints of his or her browsing the internet.
|This chapter was published in: Anna Francsovics (ed.) Symposium for Young Researchers 2007: Proceedings, , pages 91-97, 2007.|
|This item is provided by Óbuda University, Keleti Faculty of Business and Management in its series Proceedings Papers of Business Sciences: Symposium for Young Researchers (FIKUSZ) 2007 with number 91-97.|
|Contact details of provider:|| Postal: 1084 Budapest, Tavaszmezö u. 15-17|
Web page: http://www.kgk.uni-obuda.hu
More information through EDIRC
When requesting a correction, please mention this item's handle: RePEc:pkk:sfyr07:91-97. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Alexandra Vécsey)
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If references are entirely missing, you can add them using this form.
If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.
Please note that corrections may take a couple of weeks to filter through the various RePEc services.