E-mail security : how to keep your electronic messages private / Bruce Schneier.
By: Schneier, Bruce
.
Material type: ![materialTypeLabel](/opac-tmpl/lib/famfamfam/BK.png)
![](/opac-tmpl/bootstrap/images/filefind.png)
Item type | Current library | Call number | Copy number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
General Lending | MTU Bishopstown Library Lending | 005.82 (Browse shelf(Opens below)) | 1 | Available | 00009977 |
Browsing MTU Bishopstown Library shelves, Shelving location: Lending Close shelf browser (Hides shelf browser)
Enhanced descriptions from Syndetics:
Using non-technical, jargon-free language, it takes a look at the issues of privacy in E-mail, rates the security of the most popular E-mail programs and offers practical solutions in the form of two leading-edge encryption programs, Privacy Enhanced Mail (PEM) and Pretty Good Privacy (PGP). Highlights the potential problems with the security systems of the most popular commercial E-mail products including Lotus cc:Mail, DaVinci Mail, Microsoft Mail and the Apple Open Collaborative Environment. Anecdotes, dramatizing the vulnerability of many so-called ``secure'' communications systems, are also included.
Covers PGP and PEM.
Includes index.
Part I: Privacy and electronic mail -- The problem -- Encryption -- Key management -- Authentication -- Certificates -- Keeping your private key private -- Odds and ends -- Patents, governments and export laws -- Part II: Achieving electronic mail privacy -- Requirements and features -- Privacy enhanced mail (PEM) -- Pretty good privacy (PGP) -- Comparing PGP and PEM -- Attacks against PGP and PEM.
Table of contents provided by Syndetics
- Privacy And Electronic Mail
- The Problem
- Encryption
- Key Management
- Authentication
- Certificates
- Keeping Your Private Key Private
- Odds and Ends
- Patents, Governments, and Export Laws
- Achieving Electronic-Mail Privacy
- Requirements and Features
- Privacy Enhanced Mail (PEM)
- Pretty Good Privacy (PGP)
- Comparing PGP and PEM
- Attacks Against PGP and PEM
- Appendices
- Index
Author notes provided by Syndetics
Bruce Schneier is a Fellow at the Berkman Center for Internet and Society at Harvard Law School and the CTO of Resilient Systems, Inc. He is a security expert and author of numerous books including Beyond Fear: Thinking Sensibly About Security in an Uncertain World, Carry On: Sound Advice from Schneier on Security, and Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World.(Bowker Author Biography)