E-mail security : how to keep your electronic messages private. / Bruce Schneier.
Material type: TextPublisher: New York : John Wiley & Sons, 1995Description: xii, 365 p. : ill. ; 24 cmISBN: 047105318X 9780471053187Subject(s): Electronic mail systems | Computer networks and techniques | Computers -- SecurityLOC classification: HE6239.E54 S36
Contents:
Contents: Part 1: Privacy and electronic mail -- The Problem -- Encription -- Key management -- Authentication -- Certificates -- Keeping your private key private -- Odds and ends -- Patents, governments, and export laws -- Achieving electronic -mail privacy -- Reqiurements and features -- Privacy enhanced mail -- Pretty good privacy -- Comparing PGP and PEM -- Attacks against PGP AND PEM -- Appendix A: Pretty good privacy -- Appendix B: Privacy enhanced mail.
Item type | Current location | Home library | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
Books | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY General Stacks | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY | HE6239.E54 S36 (Browse shelf) | 1 | Available | 1962/12 | |
Books | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY General Stacks | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY | HE6239.E54 S361 (Browse shelf) | 2 | Available | 1963/12 | |
Books | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY General Stacks | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY | HE6239.E54 S362 (Browse shelf) | 3 | Available | 1964/12 | |
Books | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY General Stacks | WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY | HE6239.E54 S363 (Browse shelf) | 4 | Available | 1965/12 |
Contents: Part 1: Privacy and electronic mail -- The Problem -- Encription -- Key management -- Authentication -- Certificates -- Keeping your private key private -- Odds and ends -- Patents, governments, and export laws -- Achieving electronic -mail privacy -- Reqiurements and features -- Privacy enhanced mail -- Pretty good privacy -- Comparing PGP and PEM -- Attacks against PGP AND PEM -- Appendix A: Pretty good privacy -- Appendix B: Privacy enhanced mail.
There are no comments on this title.