Encrypted Email

The History and Technology of Message Privacy

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Encrypted Email by Hilarie Orman, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Hilarie Orman ISBN: 9783319213446
Publisher: Springer International Publishing Publication: August 8, 2015
Imprint: Springer Language: English
Author: Hilarie Orman
ISBN: 9783319213446
Publisher: Springer International Publishing
Publication: August 8, 2015
Imprint: Springer
Language: English

This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the challenges in standardization, usability, and trust that interfere with the user experience for software protection. Chapters address the origins of email encryption and why email encryption is rarely used despite the myriad of its benefits -- benefits that cannot be obtained in any other way. The construction of a secure message and its entwining with public key technology are covered. Other chapters address both independent standards for secure email and how they work. The final chapters include a discussion of getting started with encrypted email and how to live with it.

Written by an expert in software security and computer tools, Encrypted Email: The History and Technology of Message Privacy is designed for researchers and professionals working in email security and encryption. Advanced-level students interested in security and networks will also find the content valuable.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the challenges in standardization, usability, and trust that interfere with the user experience for software protection. Chapters address the origins of email encryption and why email encryption is rarely used despite the myriad of its benefits -- benefits that cannot be obtained in any other way. The construction of a secure message and its entwining with public key technology are covered. Other chapters address both independent standards for secure email and how they work. The final chapters include a discussion of getting started with encrypted email and how to live with it.

Written by an expert in software security and computer tools, Encrypted Email: The History and Technology of Message Privacy is designed for researchers and professionals working in email security and encryption. Advanced-level students interested in security and networks will also find the content valuable.

More books from Springer International Publishing

Cover of the book Coordination, Organizations, Institutions, and Norms in Agent Systems IX by Hilarie Orman
Cover of the book Spline and Spline Wavelet Methods with Applications to Signal and Image Processing by Hilarie Orman
Cover of the book Coding Ockham's Razor by Hilarie Orman
Cover of the book Extremophile Fishes by Hilarie Orman
Cover of the book China’s Intellectual Property Regime for Innovation by Hilarie Orman
Cover of the book The Origins of Democracy in Tribes, City-States and Nation-States by Hilarie Orman
Cover of the book Hypergraph Theory by Hilarie Orman
Cover of the book Charge and Spin Transport in Disordered Graphene-Based Materials by Hilarie Orman
Cover of the book New Directions in the Ethics of Assisted Suicide and Euthanasia by Hilarie Orman
Cover of the book The Ageing Immune System and Health by Hilarie Orman
Cover of the book Loricate Ciliate Tintinnids in a Tropical Mangrove Wetland by Hilarie Orman
Cover of the book How to Count by Hilarie Orman
Cover of the book Bondage and the Environment in the Indian Ocean World by Hilarie Orman
Cover of the book Energy Geotechnics by Hilarie Orman
Cover of the book Advances in Human Factors, Software, and Systems Engineering by Hilarie Orman
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy