Personal encryption clearly explained

Author(s)

    • Loshin, Peter

Bibliographic Information

Personal encryption clearly explained

Pete Loshin

AP Professional, c1998

  • [: pbk]

Available at  / 1 libraries

Search this Book/Journal

Note

Includes index

Description and Table of Contents

Description

To any person engaged in highly sensitive information exchanges, the issue of secure transmissions is a top priority. This book shows readers how to protect themselves and their electronic information in order to enjoy the benefits of worry-free communication technology and digital commerce. It opens with an introduction to the concepts of modern encryption: secret-key encryption, public key encryption, digital signatures, and user authentication mechanisms. It moves into why encryption is necessary, how it can be used to protect information at the individual level, and how cryptographic technologies are implemented in both software and hardware. It also shows how to set up a personal encryption system, and how to use it to protect yourself while browsing the Web, sending and receiving e-mail, or using any Internet application.

Table of Contents

It's a Dangerous World. Modern Cryptography Printer. Non-Technical Cryptographic Issues. Implementing Cryptography. Getting Crypto-Enabled. Secure Web Surfing. Secure E-Mail. Secure Commerce. Secure Desktop. Secure Hardware. Practising Safe Cryptography. Index.

by "Nielsen BookData"

Details

Page Top