Personal encryption clearly explained
Author(s)
Bibliographic Information
Personal encryption clearly explained
AP Professional, c1998
- [: pbk]
Available at / 1 libraries
-
No Libraries matched.
- Remove all filters.
Note
Includes index
Description and Table of Contents
Description
To any person engaged in highly sensitive information exchanges, the issue of secure transmissions is a top priority. This book shows readers how to protect themselves and their electronic information in order to enjoy the benefits of worry-free communication technology and digital commerce. It opens with an introduction to the concepts of modern encryption: secret-key encryption, public key encryption, digital signatures, and user authentication mechanisms. It moves into why encryption is necessary, how it can be used to protect information at the individual level, and how cryptographic technologies are implemented in both software and hardware. It also shows how to set up a personal encryption system, and how to use it to protect yourself while browsing the Web, sending and receiving e-mail, or using any Internet application.
Table of Contents
It's a Dangerous World. Modern Cryptography Printer. Non-Technical Cryptographic Issues. Implementing Cryptography. Getting Crypto-Enabled. Secure Web Surfing. Secure E-Mail. Secure Commerce. Secure Desktop. Secure Hardware. Practising Safe Cryptography. Index.
by "Nielsen BookData"