E-mail Security: How to Keep Your Electronic Messages Private Paperback – Jan 25 1995
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.
To get the free app, enter your mobile phone number.
From the Publisher
Using non-technical, jargon-free language, it takes a look at the issues of privacy in E-mail, rates the security of the most popular E-mail programs and offers practical solutions in the form of two leading-edge encryption programs, Privacy Enhanced Mail (PEM) and Pretty Good Privacy (PGP). Highlights the potential problems with the security systems of the most popular commercial E-mail products including Lotus cc:Mail, DaVinci Mail, Microsoft Mail and the Apple Open Collaborative Environment. Anecdotes, dramatizing the vulnerability of many so-called ``secure'' communications systems, are also included.
From the Back Cover
Who's Reading Your E-Mail? The Competition? A Reporter? Your Boss? The world of e-mail is the world of postcards. Between you and your correspondents may lurk a foreign government, a business competitor, an overzealous law enforcement agency, or even just a nosy neighbor! The problem is, all of these potential eavesdroppers, given fairly simple access tools, can read your messages as easily as a postal worker can read your postcards. In this book, security expert Bruce Schneier shows you how to protect your privacy by sealing your messages in "electronic envelopes." E-Mail Security is about protecting electronic mail from spies, interlopers, and spoofs-people who may want to destroy, alter, or just look at your private communications. The book shows how you can protect the financial information, contract negotiations, or personal correspondence you entrust to public or private networks-and it shows how this protection is available right now, with free or inexpensive software. The author, a highly regarded security consultant, explains the issues and technologies, examines the currently available software, and helps you choose the approach that's right for you. Included is detailed information on:
* PGP and PEM-the hottest encryption programs
* DES and IDEA encryption algorithms
* The RSA and DSA public-key algorithms
* Key management-critical in security
* Patent and export issues-who "owns" these programs
Top Customer Reviews
The author is a crypto and computer security consultant.
Includes detailed information on:
PGP and PEM encryption programs,
DES and IDEA encryption algorithms,
The RSA and DSA public-key algorithms,
Key management (critical in security), and
Patent and export issues -- who "owns" the programs
Most Helpful Customer Reviews on Amazon.com (beta)
Look for similar items by category
- Books > Business & Investing > Industries & Professions > E-commerce
- Books > Computers & Technology > Certification Central > Exams > Security+
- Books > Computers & Technology > History & Culture > Privacy
- Books > Computers & Technology > Internet & Social Media
- Books > Computers & Technology > Networking & Cloud Computing > Internet, Groupware, & Telecommunications
- Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs
- Books > Computers & Technology > Programming
- Books > Computers & Technology > Security & Encryption > Privacy & Online Safety
- Books > Computers & Technology > Software > E-mail
- Books > Computers & Technology > Web Development > Security & Encryption > Encryption
- Books > Politics & Social Sciences > Social Sciences > Communication
- Books > Professional & Technical > Engineering > Telecommunications
- Books > Professional & Technical > Transportation
- Books > Textbooks > Computer Science & Information Systems > Networking