Information Security Essentials
-
Susan E. McGregor
About this book
Author / Editor information
Reviews
McGregor takes a complex subject and makes it both accessible and actionable. In Information Security Essentials, you’ll find important background information, case studies, and guidance from experts willing to share the secrets they have learned along the way. An invaluable resource for media professionals and cybersecurity experts alike.
Meredith Broussard, author of Artificial Unintelligence: How Computers Misunderstand the World:
Susan E. McGregor has written the essential book on security for journalists. From source protection to device security to encryption and conflict reporting, this book covers everything that modern journalists need to stay safe online and IRL. Technology changes fast, but McGregor blends basic security concepts with a nuanced understanding of tech to give journalists timeless advice that can be adapted as the tech evolves.
Harlo Holmes, director of digital security at Freedom of the Press Foundation:
McGregor takes an honest and often unflinching look at how emerging practices have come to bear on digital security, and in a way that is always one step ahead of the curve.
Sarah Cohen, Knight Chair in Data Journalism at the Cronkite School of Journalism and winner of the Pulitzer Prize in Investigative Reporting:
Susan E. McGregor has written a crucial resource for working journalists, journalism students, and anyone curious about the many sides of digital security. Her clear explanations and practical guidance mean that reporters are no longer paralyzed by fear of digital intrusions and instead have concrete strategies and plans to apply to a variety of projects.
Topics
Publicly Available Download PDF |
i |
Publicly Available Download PDF |
vii |
Requires Authentication Unlicensed Licensed Download PDF |
1 |
Requires Authentication Unlicensed Licensed Download PDF |
7 |
Requires Authentication Unlicensed Licensed Download PDF |
26 |
Requires Authentication Unlicensed Licensed Download PDF |
33 |
Requires Authentication Unlicensed Licensed Download PDF |
49 |
Requires Authentication Unlicensed Licensed Download PDF |
69 |
Requires Authentication Unlicensed Licensed Download PDF |
78 |
Requires Authentication Unlicensed Licensed Download PDF |
89 |
Requires Authentication Unlicensed Licensed Download PDF |
103 |
Requires Authentication Unlicensed Licensed Download PDF |
114 |
Requires Authentication Unlicensed Licensed Download PDF |
126 |
Requires Authentication Unlicensed Licensed Download PDF |
144 |
Requires Authentication Unlicensed Licensed Download PDF |
158 |
Requires Authentication Unlicensed Licensed Download PDF |
174 |
Requires Authentication Unlicensed Licensed Download PDF |
183 |
Requires Authentication Unlicensed Licensed Download PDF |
189 |
Requires Authentication Unlicensed Licensed Download PDF |
207 |