No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
To get the free app, enter your e-mail address or mobile phone number.
Using non-technical, jargon-free language, it takes a look at the issues of privacy in E-mail, rates the security of the most popular E-mail programs and offers practical solutions in the form of two leading-edge encryption programs, Privacy Enhanced Mail (PEM) and Pretty Good Privacy (PGP). Highlights the potential problems with the security systems of the most popular commercial E-mail products including Lotus cc:Mail, DaVinci Mail, Microsoft Mail and the Apple Open Collaborative Environment. Anecdotes, dramatizing the vulnerability of many so-called ``secure'' communications systems, are also included.
Who's Reading Your E-Mail? The Competition? A Reporter? Your Boss? The world of e-mail is the world of postcards. Between you and your correspondents may lurk a foreign government, a business competitor, an overzealous law enforcement agency, or even just a nosy neighbor! The problem is, all of these potential eavesdroppers, given fairly simple access tools, can read your messages as easily as a postal worker can read your postcards. In this book, security expert Bruce Schneier shows you how to protect your privacy by sealing your messages in "electronic envelopes." E-Mail Security is about protecting electronic mail from spies, interlopers, and spoofs-people who may want to destroy, alter, or just look at your private communications. The book shows how you can protect the financial information, contract negotiations, or personal correspondence you entrust to public or private networks-and it shows how this protection is available right now, with free or inexpensive software. The author, a highly regarded security consultant, explains the issues and technologies, examines the currently available software, and helps you choose the approach that's right for you. Included is detailed information on:
* PGP and PEM-the hottest encryption programs
* DES and IDEA encryption algorithms
* The RSA and DSA public-key algorithms
* Key management-critical in security
* Patent and export issues-who "owns" these programs