Difference between revisions of "Lesson 5 Further Reading"

 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
  
How to use mobile phones as securely as possible https://securityinabox.org/en/chapter-10
+
*[https://securityinabox.org/en/chapter-10 How to use mobile phones as securely as possible]
  
How to use smartphones as securely as possible https://securityinabox.org/en/chapter-11
+
*[https://securityinabox.org/en/chapter-11 How to use smartphones as securely as possible ]
  
Mobile Security https://securityinabox.org/en/portable_security
+
*[https://securityinabox.org/en/portable_security Mobile Security]
  
Surveillance Self Defense https://ssd.eff.org/
+
*[https://ssd.eff.org/ Surveillance Self Defense]
  
How to protect yourself and your data when using social networking sites https://securityinabox.org/en/chapter-9
+
*[https://securityinabox.org/en/chapter-9 How to protect yourself and your data when using social networking sites]

Latest revision as of 21:39, 28 May 2014