Difference between revisions of "Lesson 5 Further Reading"

Ben (Talk | contribs)
Ben (Talk | contribs)
 
Line 1: Line 1:
  
*How to use mobile phones as securely as possible https://securityinabox.org/en/chapter-10
+
*[https://securityinabox.org/en/chapter-10 How to use mobile phones as securely as possible]
  
*How to use smartphones as securely as possible https://securityinabox.org/en/chapter-11
+
*[https://securityinabox.org/en/chapter-11 How to use smartphones as securely as possible ]
  
*Mobile Security https://securityinabox.org/en/portable_security
+
*[https://securityinabox.org/en/portable_security Mobile Security]
  
*Surveillance Self Defense https://ssd.eff.org/
+
*[https://ssd.eff.org/ Surveillance Self Defense]
  
*How to protect yourself and your data when using social networking sites https://securityinabox.org/en/chapter-9
+
*[https://securityinabox.org/en/chapter-9 How to protect yourself and your data when using social networking sites]

Latest revision as of 21:39, 28 May 2014

Last modified on 28 May 2014, at 21:39