Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools

Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools

by Slava Gomzin
Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools

Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools

by Slava Gomzin

eBook

$3.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers

LEND ME® See Details

Overview

Booklet for anyone who wants to keep their email correspondence private and protect it from unauthorized access. Step-by-step guide explains how to ensure security of email communication by utilizing existing technology.

Topics include: review of security features such as Authentication, Integrity, Non-Repudiation, and Confidentiality, explanation of cryptographic features such as digital signature and encryption, how to obtain free email certificate and install it on Outlook and iPhone, configuring Outlook and iPhone for email encryption, and more (Article: ~3,100 words).

Table of Contents

Introduction
Part I: The �Theory� of Cryptographic Message Protection
What is Public Key Encryption?
What is Public Key Infrastructure?
What is S/MIME?
What is Digital Certificate?
What Is Digital Signature?
Security Features Provided by Digital Certificate: Difference between Encryption and Digital Signature
Security Features Provided by Digital Signature
Security Features Provided by Encryption
Part II: Implementing Email Protection
Obtaining Your Personal Email Certificate (Digital ID)
Configuring Outlook
Installing Email Certificate on iPhone
Configuring Exchange Email Account on iPhone
Sending Encrypted and Digitally Signed Email from Outlook
Sending Encrypted and Digitally Signed Email from iPhone
Obtaining Recipient Certificates
Conclusion
Encryption and Digital Signatures in Gmail
Resources
About the Author

Product Details

BN ID: 2940014355070
Publisher: Book'n'share Media
Publication date: 05/28/2012
Series: Cyber Privacy
Sold by: Barnes & Noble
Format: eBook
File size: 814 KB

About the Author

Slava Gomzin is a Security and Payments Technologist at Hewlett-Packard, where he helps create products that are integrated into modern payment processing ecosystems using the latest security and payments technologies. Prior to joining Hewlett-Packard, Slava was a security architect, corporate product security officer, R&D and application security manager, and development team leader at Retalix, a Division of NCR Retail. As PCI ISA, he focused on security and PA-DSS, PCI DSS, and PCI P2PE compliance of POS systems, payment applications, and gateways. Before moving into security, Slava worked in R&D on design and implementation of new products including next-generation POS systems and various interfaces to payment gateways and processors. Slava currently holds CISSP, PCIP, ECSP, and Security+ certifications. He blogs about payment security at www.gomzin.com.
From the B&N Reads Blog

Customer Reviews