Privacy & Security

Showing all 15 results

  • Take Control of Find My and AirTags cover

    Take Control of Find My and AirTags

    Take Control of Find My and AirTags takes you inside Apple’s Find My ecosystem. Once a way to track the whereabouts of your iPhone by having it ping the internet at regular intervals, now Find My encompasses sharing and following people (with permission), much of Apple’s hardware and some Beats audio gear, and new trackers from Apple and third parties (including the AirTag). This book helps you understand how it all fits together, and how to keep yourself safe by preventing, identifying, and blocking unwanted tracking.

    Clear
  • Take Control of 1Password cover

    Take Control of 1Password

    Annoyed by having to type hard-to-remember passwords? Let 1Password do the heavy lifting. With coverage of 1Password for Mac, Windows, Linux, iOS/iPadOS, and Android, author Joe Kissell shows you how to generate and enter secure passwords, speed up your online shopping, and share and sync web logins and other confidential data.

    Clear
  • Take Control of Your Passwords cover

    Take Control of Your Passwords

    Password overload has driven many of us to take dangerous shortcuts. If you think ZombieCat12 is a secure password, that you can safely reuse a password, or that no one would try to steal your password, think again! Overcome password frustration with expert advice from Joe Kissell!

    Clear
  • Take Control of Cryptocurrency cover

    Take Control of Cryptocurrency

    In Take Control of Cryptocurrency, Glenn Fleishman casts aside the headlines and hype around cryptocurrency to dig in on the fundamentals. You learn everything you need to know as an individual from the ground up about cryptocurrency, including details about the popular forms of it. You’ll find out what risks it poses for the planet—and for your pocketbook. Discover the role of a cryptocurrency wallet, how to find the best one, and how to use it safely. You will understand the ins and outs of buying and selling cryptocurrency and using it for real-world purchases and sales. Glenn also explains the mystery of NFTs (non-fungible tokens), which are a peculiar but popular use of cryptocurrency that lets you own unique digital artwork.

    Clear
  • Take Control of iOS & iPadOS Privacy and Security cover

    Take Control of iOS & iPadOS Privacy and Security

    Ensuring that your iPhone or iPad’s data remains secure and in your control and that your private data remains private isn’t a battle—if you know what boxes to check and how to configure iOS and iPadOS to your advantage. While Apple biases security and privacy in your favor, Take Control of iOS & iPadOS Privacy and Security takes you into the intricacies of Apple’s choices when it comes to networking, data sharing, and encryption.

    Clear
  • Take Control of Backing Up Your Mac cover

    Take Control of Backing Up Your Mac

    Joe Kissell provides the advice you need to create a Mac backup strategy that protects your data and enables quick recovery. He compares backup software, services, and media to help you make the best choices. You’ll learn to set up, test, and maintain backups, plus how to restore files after a calamity!

    Clear
  • Take Control of Your M-Series Mac cover

    Take Control of Your M-Series Mac

    This book teaches you everything you need to know about hardware and related software changes in Apple’s new M1 Apple silicon Macs to make a transition from an Intel Mac, set up security with new options, create effective backups, and work with new options in recovery mode. Glenn Fleishman takes you through the details of how an M1-based Mac handles startup, battery management, and running iOS, iPadOS, and Windows apps. Covers the 2020–21 Apple M1 Macs: the Mac mini, MacBook Air, 13-inch MacBook Pro, and 24-inch iMac.

    Clear
  • Take Control of Securing Your Mac cover

    Take Control of Securing Your Mac

    Secure your Mac against attacks from the internet and physical intrusion with the greatest of ease. Glenn Fleishman guides you through configuring your Mac to protect against phishing, malware, network intrusion, social engineering, and invaders who might tap physically into your computer. Glenn teaches how to secure your data at rest and in motion. Learn about built-in privacy settings, the Secure Enclave, FileVault, sandboxing, VPNs, recovering a missing Mac, and much more. Covers Mojave, Catalina, and Big Sur.

    Clear
  • Take Control of Your Apple ID cover

    Take Control of Your Apple ID

    This book covers everything someone needs to know about configuring an Apple ID account, interactions with iCloud-based services, and troubleshooting account access.

    Clear
  • Take Control of Home Security Cameras cover

    Take Control of Home Security Cameras

    Are you thinking about installing a home security camera (or several!) or a smart-home security and sensor system that includes cameras? This book guides you through the many decisions about quality, features, privacy, and security that will help you find just what you want. If you own one or more home security cameras already, you’ll learn much more about options, configuration, and changes you can make—and how you might expand your system or replace parts of it. (This book could even convince you that the time isn’t right to purchase a home security camera given tradeoffs you don’t want to make, especially on privacy and security!)

    Clear
  • Take Control of iCloud cover

    Take Control of iCloud

    Apple’s iCloud service is highly useful, but it can also create headaches for the average user. In Take Control of iCloud, Seventh Edition, Joe Kissell explains how to avoid frustrations and make iCloud work for you across all your devices.

    Clear
  • Take Control of Wi-Fi Networking and Security

    Take Control of Wi-Fi Networking and Security

    Setting up and securing a Wi-Fi network can be complicated and confusing. This book helps you over every hurdle involved in picking gateways, setting up a network, adding devices, and securing the network and connected phones, tablets, and computers. It’s useful for those who have set up networks in the past and want to replace them with new gear, as well as people who have never built a Wi-Fi network before.

    Clear
  • Connect and Secure Your iPhone and iPad cover

    Connect and Secure Your iPhone and iPad

    Get up to speed fast on controlling your privacy on your iPhone and iPad, while keeping everything secure. Connect and Secure Your iPhone and iPad covers iOS 13 and iPadOS 13, and walks you through setting up networks, controlling cellular data usage, securing your connection, and protecting your privacy.

    Clear
  • Take Control of Your Online Privacy 1

    Take Control of Your Online Privacy

    Nowadays, it can be difficult to complete ordinary activities without placing your personal data online, but having your data online puts you at risk for theft, embarrassment, and all manner of trouble. Read this book to find practical advice that ordinary people need to handle common online privacy problems and to develop a sensible online privacy strategy, customized for your needs.

    Clear
  • Take Control of Your Digital Legacy

    Take Control of Your Digital Legacy

    How do you want to be remembered? A will takes care of your physical possessions, but what about your digital life—photos, email, files, and the like? If you want to pass your electronic ephemera on as part of your digital legacy, turn to tech expert Joe Kissell for advice on dealing with large quantities of data, file formats, media types, the need for a “digital executor,” and more.

    Clear

Showing all 15 results