MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

E-mail security : how to keep your electronic messages private / Bruce Schneier.

By: Schneier, Bruce, 1963-.
Material type: materialTypeLabelBookPublisher: New York : Wiley, 1995Description: xii, 365 p. : ill. ; 24 cm.ISBN: 047105318X .Subject(s): Electronic mail systemsDDC classification: 005.82
Contents:
Part I: Privacy and electronic mail -- The problem -- Encryption -- Key management -- Authentication -- Certificates -- Keeping your private key private -- Odds and ends -- Patents, governments and export laws -- Part II: Achieving electronic mail privacy -- Requirements and features -- Privacy enhanced mail (PEM) -- Pretty good privacy (PGP) -- Comparing PGP and PEM -- Attacks against PGP and PEM.
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
General Lending MTU Bishopstown Library Lending 005.82 (Browse shelf(Opens below)) 1 Available 00009977
Total holds: 0

Enhanced descriptions from Syndetics:

Using non-technical, jargon-free language, it takes a look at the issues of privacy in E-mail, rates the security of the most popular E-mail programs and offers practical solutions in the form of two leading-edge encryption programs, Privacy Enhanced Mail (PEM) and Pretty Good Privacy (PGP). Highlights the potential problems with the security systems of the most popular commercial E-mail products including Lotus cc:Mail, DaVinci Mail, Microsoft Mail and the Apple Open Collaborative Environment. Anecdotes, dramatizing the vulnerability of many so-called ``secure'' communications systems, are also included.

Covers PGP and PEM.
Includes index.

Part I: Privacy and electronic mail -- The problem -- Encryption -- Key management -- Authentication -- Certificates -- Keeping your private key private -- Odds and ends -- Patents, governments and export laws -- Part II: Achieving electronic mail privacy -- Requirements and features -- Privacy enhanced mail (PEM) -- Pretty good privacy (PGP) -- Comparing PGP and PEM -- Attacks against PGP and PEM.

Table of contents provided by Syndetics

  • Privacy And Electronic Mail
  • The Problem
  • Encryption
  • Key Management
  • Authentication
  • Certificates
  • Keeping Your Private Key Private
  • Odds and Ends
  • Patents, Governments, and Export Laws
  • Achieving Electronic-Mail Privacy
  • Requirements and Features
  • Privacy Enhanced Mail (PEM)
  • Pretty Good Privacy (PGP)
  • Comparing PGP and PEM
  • Attacks Against PGP and PEM
  • Appendices
  • Index

Author notes provided by Syndetics

Bruce Schneier is a Fellow at the Berkman Center for Internet and Society at Harvard Law School and the CTO of Resilient Systems, Inc. He is a security expert and author of numerous books including Beyond Fear: Thinking Sensibly About Security in an Uncertain World, Carry On: Sound Advice from Schneier on Security, and Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World.

(Bowker Author Biography)

Powered by Koha