Difference between revisions of "Lesson 5 Further Reading"
(Created page with " How to use mobile phones as securely as possible How to use smartphones as securely as possible Mobile Security Surveillance Self Defense How to protect y...") |
|||
Line 1: | Line 1: | ||
− | + | How to use mobile phones as securely as possible https://securityinabox.org/en/chapter-10 | |
− | + | ||
− | + | How to use smartphones as securely as possible https://securityinabox.org/en/chapter-11 | |
− | + | ||
− | + | Mobile Security https://securityinabox.org/en/portable_security | |
+ | |||
+ | Surveillance Self Defense https://ssd.eff.org/ | ||
+ | |||
+ | How to protect yourself and your data when using social networking sites https://securityinabox.org/en/chapter-9 |
Revision as of 21:41, 12 May 2014
How to use mobile phones as securely as possible https://securityinabox.org/en/chapter-10
How to use smartphones as securely as possible https://securityinabox.org/en/chapter-11
Mobile Security https://securityinabox.org/en/portable_security
Surveillance Self Defense https://ssd.eff.org/
How to protect yourself and your data when using social networking sites https://securityinabox.org/en/chapter-9