Difference between revisions of "Lesson 5 Further Reading"

Line 1: Line 1:
  
How to use mobile phones as securely as possible https://securityinabox.org/en/chapter-10
+
*How to use mobile phones as securely as possible https://securityinabox.org/en/chapter-10
  
How to use smartphones as securely as possible https://securityinabox.org/en/chapter-11
+
*How to use smartphones as securely as possible https://securityinabox.org/en/chapter-11
  
Mobile Security https://securityinabox.org/en/portable_security
+
*Mobile Security https://securityinabox.org/en/portable_security
  
Surveillance Self Defense https://ssd.eff.org/
+
*Surveillance Self Defense https://ssd.eff.org/
  
How to protect yourself and your data when using social networking sites https://securityinabox.org/en/chapter-9
+
*How to protect yourself and your data when using social networking sites https://securityinabox.org/en/chapter-9

Revision as of 21:35, 28 May 2014