Normal view MARC view ISBD view

E-mail security : how to keep your electronic messages private / Bruce Schneier.

By: Schneier, Bruce, 1963-.
Material type: TextTextPublisher: New York : Wiley, c1995Description: xii, 365 p. : ill. ; 24 cm.ISBN: 047105318X :; 9780471053187.Subject(s): Electronic mail systemsDDC classification: 005.71369 Online resources: Contributor biographical information | Publisher description | Table of Contents | WorldCat details
Contents:
Table of contents pt. I. Privacy and Electronic Mail. Ch. 1. The Problem. Ch. 2. Encryption. Ch. 3. Key Management. Ch. 4. Authentication. Ch. 5. Certificates. Ch. 6. Keeping Your Private Key Private. Ch. 7. Odds and Ends. Ch. 8. Patents, Governments, and Export Laws -- pt. II. Achieving Electronic-Mail Privacy. Ch. 9. Requirements and Features. Ch. 10. Privacy Enhanced Mail (PEM). Ch. 11. Pretty Good Privacy (PGP). Ch. 12. Comparing PGP and PEM. Ch. 13. Attacks Against PGP and PEM -- Appendix A: Pretty Good Privacy -- Appendix B: Privacy Enhanced Mail.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Copy number Status Date due Barcode Item holds
Text Text EWU Library
Reserve Section
Non-fiction 005.71369 SCE 1995 (Browse shelf) C-1 Not For Loan 1271
Total holds: 0
Browsing EWU Library Shelves , Shelving location: Reserve Section Close shelf browser
005.7126 HAW 2002 Wireless Java programming for enterprise applications : 005.71'3 TUI 2003 IIS 6 administration / 005.713 TUA 1998 IIS 4.0 / 005.71369 SCE 1995 E-mail security : 005.7'1376 PAT 1999 TCP/IP unleashed / 005.7'1376 PAT 1999 TCP/IP unleashed / 005.7'1376 PAT 1999 TCP/IP unleashed /

Includes index.

Table of contents pt. I. Privacy and Electronic Mail. Ch. 1. The Problem. Ch. 2. Encryption. Ch. 3. Key Management. Ch. 4. Authentication. Ch. 5. Certificates. Ch. 6. Keeping Your Private Key Private. Ch. 7. Odds and Ends. Ch. 8. Patents, Governments, and Export Laws --
pt. II. Achieving Electronic-Mail Privacy. Ch. 9. Requirements and Features. Ch. 10. Privacy Enhanced Mail (PEM). Ch. 11. Pretty Good Privacy (PGP). Ch. 12. Comparing PGP and PEM. Ch. 13. Attacks Against PGP and PEM --
Appendix A: Pretty Good Privacy --
Appendix B: Privacy Enhanced Mail.

Computer Science & Engineering

There are no comments for this item.

Log in to your account to post a comment.

Library Home | Contacts | E-journals
Copyright @ 2011-2019 EWU Library
East West University