E-mail security : how to keep your electronic messages private
Author(s)
Bibliographic Information
E-mail security : how to keep your electronic messages private
Wiley, c1995
Available at 18 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
Note
Includes index
Description and Table of Contents
Description
Using non-technical, jargon-free language, it takes a look at the issues of privacy in E-mail, rates the security of the most popular E-mail programs and offers practical solutions in the form of two leading-edge encryption programs, Privacy Enhanced Mail (PEM) and Pretty Good Privacy (PGP). Highlights the potential problems with the security systems of the most popular commercial E-mail products including Lotus cc:Mail, DaVinci Mail, Microsoft Mail and the Apple Open Collaborative Environment. Anecdotes, dramatizing the vulnerability of many so-called "secure" communications systems, are also included.
Table of Contents
PRIVACY AND ELECTRONIC MAIL. The Problem. Encryption. Key Management. Authentication. Certificates. Keeping Your Private Key Private. Odds and Ends. Patents, Governments, and Export Laws. ACHIEVING ELECTRONIC-MAIL PRIVACY. Requirements and Features. Privacy Enhanced Mail (PEM). Pretty Good Privacy (PGP). Comparing PGP and PEM. Attacks Against PGP and PEM. Appendices. Index.
by "Nielsen BookData"