1995-01-22 - Another Book By Schneier…

Header Data

From: werewolf@io.org (Mark Terka)
To: cypherpunks@toad.com
Message Hash: 247f696e82f98221ce632fc2cef2d08cf15bd3b363fe34f934767f1073c6eedb
Message ID: <yqd8lOwsccZQ077yn@io.org>
Reply To: N/A
UTC Datetime: 1995-01-22 22:07:16 UTC
Raw Date: Sun, 22 Jan 95 14:07:16 PST

Raw message

From: werewolf@io.org (Mark Terka)
Date: Sun, 22 Jan 95 14:07:16 PST
To: cypherpunks@toad.com
Subject: Another Book By Schneier...
Message-ID: <yqd8lOwsccZQ077yn@io.org>
MIME-Version: 1.0
Content-Type: text/plain


Saw this on one of the cryptography conferences.....

From: schneier@chinet.chinet.com (Bruce Schneier)
Subject: E-Mail Security - New book by Bruce Schneier
Message-ID: <D2qsIJ.Dzz@chinet.chinet.com>
Organization: Chinet - Public Access UNIX
Date: Sat, 21 Jan 1995 06:25:31 GMT


                E-MAIL SECURITY WITH PGP AND PEM:
          HOW TO KEEP YOUR ELECTRONIC MESSAGES PRIVATE

                 ...a new book by Bruce Schneier

                     John Wiley & Sons, 1995
                       ISBN  0-471-05318-X
                             $24.95

The world of e-mail is the world of postcards.  Between you and
your correspondents may lurk a foreign government, a business
competitor, an overzealous law enforcement agency, or even just a
nosy neighbor.  The problem is, all of these potential
eavesdroppers, given fairly simple access tools, can read your
messages as easy as a postal worker can read your postcards.

E-MAIL SECURITY is about protecting electronic mail fm spies,
interlopers, and spoofs--people who may want to destroy, alter,
or just look at your private communications.  The book shows how
you can protect the financial information, contract negotiations,
or personal correspondence you entrust to public or private
networks--and it shows how this protection is available right
now, with free or inexpensive software.

The book discusses PGP and PEM: how they work, how they are
different, and how to choose which one is right for you.


TABLE OF CONTENTS:

Part I:  Privacy and Electronic Mail
     Chapter 1:     The Problem
     Chapter 2:     Encryption
     Chapter 3:     Key Management
     Chapter 4:     Authentication
     Chapter 5:     Certificates
     Chapter 6:     Keeping Your Private Key Private
     Chapter 7:     Odds and Ends
     Chapter 8:     Patents, Governments, and Export Laws

Part II:  Achieving Electronic-Mail Privacy
     Chapter 9:     Requirements and Features
     Chapter 10:    Privacy Enhanced Mail (PEM)
     Chapter 11:    Pretty Good Privacy (PGP)
     Chapter 12:    Comparing PGP and PEM
     Chapter 13:    Attacks Against PGP and PEM

Appendix A:    Pretty Good Privacy

Appendix B:    Privacy Enhanced Mail

*****************************************************************

If you are interested in a copy of E-MAIL SECURITY, please send a
check for $25 + $5 postage (ask for rates abroad) to:

     Bruce Schneier
     730 Fair Oaks Ave
     Oak Park, IL  60302

The book won't be available until at least the end of the month,
so please be patient.






Thread