Digital Privacy and Security Using Windows

A Practical Guide

  • Nihad A. Hassan
  • Rami Hijazi

Table of contents

  1. Front Matter
    Pages i-xxiv
  2. Nihad A. Hassan, Rami Hijazi
    Pages 1-31
  3. Nihad A. Hassan, Rami Hijazi
    Pages 33-102
  4. Nihad A. Hassan, Rami Hijazi
    Pages 103-122
  5. Nihad A. Hassan, Rami Hijazi
    Pages 123-194
  6. Nihad A. Hassan, Rami Hijazi
    Pages 195-272
  7. Nihad A. Hassan, Rami Hijazi
    Pages 273-278
  8. Back Matter
    Pages 279-284

About this book


Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.

This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows. 

Digital Privacy and Security Using Windows offers a comprehensive list of practical digital privacy tutorials in addition to being a complete repository of free online resources and tools assembled in one place. The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird.

What You’ll Learn:

  • Know the various parties interested in having your private data
  • Differentiate between government and corporate surveillance, and the motivations behind each one
  • Understand how online tracking works technically
  • Protect digital data, secure online communications, and become anonymous online
  • Cover and destroy your digital traces using Windows OS
  • Secure your data in transit and at rest
  • Be aware of cyber security risks and countermeasures


Cybersecurity Security Digital privacy Online security Secure communications Email security Online anonymity Data encryption Anti-forensics Windows® security TOR Network VPN Proxy Servers Darknet Digital anti-forensics Windows security

Authors and affiliations

  • Nihad A. Hassan
    • 1
  • Rami Hijazi
    • 2
  1. 1.New YorkUSA
  2. 2.TorontoCanada

Bibliographic information