E-mail Security: How to Keep Your Electronic Messages PrivatePaperback
List price $45.09
Unavailable - AbeBooks may have this title.
- Publisher: John Wiley & Sons Inc
- Format: Paperback | 384 pages
- Dimensions: 190mm x 230mm x 26mm | 780g
- Publication date: 8 March 1995
- Publication City/Country: New York
- ISBN 10: 047105318X
- ISBN 13: 9780471053187
- Illustrations note: Illustrations
- Sales rank: 1,329,176
Using non-technical, jargon-free language, it takes a look at the issues of privacy in E-mail, rates the security of the most popular E-mail programs and offers practical solutions in the form of two leading-edge encryption programs, Privacy Enhanced Mail (PEM) and Pretty Good Privacy (PGP). Highlights the potential problems with the security systems of the most popular commercial E-mail products including Lotus cc:Mail, DaVinci Mail, Microsoft Mail and the Apple Open Collaborative Environment. Anecdotes, dramatizing the vulnerability of many so-called "secure" communications systems, are also included.
Other people who viewed this bought:
USD$11.16 - Save $3.86 25% off - RRP $15.02
USD$35.69 - Save $12.41 25% off - RRP $48.10
USD$19.55 - Save $5.26 21% off - RRP $24.81
USD$22.21 - Save $6.34 22% off - RRP $28.55
USD$15.61 - Save $2.42 13% off - RRP $18.03
USD$18.72 - Save $5.32 22% off - RRP $24.04
Other books in this category
USD$8.90 - Save $1.61 15% off - RRP $10.51
USD$31.38 - Save $12.21 28% off - RRP $43.59
USD$9.16 - Save $1.35 12% off - RRP $10.51
USD$33.77 - Save $8.31 19% off - RRP $42.08
USD$22.66 - Save $5.89 20% off - RRP $28.55
USD$23.32 - Save $5.23 18% off - RRP $28.55
BRUCE SCHNEIER is a security consultant and President of Counterpane Systems. He is a contributing editor to Dr. Dobb's Journal, a frequent lecturer, and the author of Applied Cryptography.
Back cover copy
This is about protecting electronic mail from spies, interlopers, and spoofs--people who may want destroy, alter, or just look at your private communications. The book shows how you can protect the financial information, contract negotiations, or personal correspondence you entrust to public or private networks--and it shows how this protection is available right now, with free or inexpensive software.
Table of contents
PRIVACY AND ELECTRONIC MAIL. The Problem. Encryption. Key Management. Authentication. Certificates. Keeping Your Private Key Private. Odds and Ends. Patents, Governments, and Export Laws. ACHIEVING ELECTRONIC-MAIL PRIVACY. Requirements and Features. Privacy Enhanced Mail (PEM). Pretty Good Privacy (PGP). Comparing PGP and PEM. Attacks Against PGP and PEM. Appendices. Index.