Difference between revisions of "Lesson 5 Further Reading"
Line 1: | Line 1: | ||
− | How to use mobile phones as securely as possible https://securityinabox.org/en/chapter-10 | + | *How to use mobile phones as securely as possible https://securityinabox.org/en/chapter-10 |
− | How to use smartphones as securely as possible https://securityinabox.org/en/chapter-11 | + | *How to use smartphones as securely as possible https://securityinabox.org/en/chapter-11 |
− | Mobile Security https://securityinabox.org/en/portable_security | + | *Mobile Security https://securityinabox.org/en/portable_security |
− | Surveillance Self Defense https://ssd.eff.org/ | + | *Surveillance Self Defense https://ssd.eff.org/ |
− | How to protect yourself and your data when using social networking sites https://securityinabox.org/en/chapter-9 | + | *How to protect yourself and your data when using social networking sites https://securityinabox.org/en/chapter-9 |
Revision as of 21:35, 28 May 2014
- How to use mobile phones as securely as possible https://securityinabox.org/en/chapter-10
- How to use smartphones as securely as possible https://securityinabox.org/en/chapter-11
- Mobile Security https://securityinabox.org/en/portable_security
- Surveillance Self Defense https://ssd.eff.org/
- How to protect yourself and your data when using social networking sites https://securityinabox.org/en/chapter-9