From: werewolf@io.org (Mark Terka)
To: cypherpunks@toad.com
Message Hash: 247f696e82f98221ce632fc2cef2d08cf15bd3b363fe34f934767f1073c6eedb
Message ID: <yqd8lOwsccZQ077yn@io.org>
Reply To: N/A
UTC Datetime: 1995-01-22 22:07:16 UTC
Raw Date: Sun, 22 Jan 95 14:07:16 PST
From: werewolf@io.org (Mark Terka)
Date: Sun, 22 Jan 95 14:07:16 PST
To: cypherpunks@toad.com
Subject: Another Book By Schneier...
Message-ID: <yqd8lOwsccZQ077yn@io.org>
MIME-Version: 1.0
Content-Type: text/plain
Saw this on one of the cryptography conferences.....
From: schneier@chinet.chinet.com (Bruce Schneier)
Subject: E-Mail Security - New book by Bruce Schneier
Message-ID: <D2qsIJ.Dzz@chinet.chinet.com>
Organization: Chinet - Public Access UNIX
Date: Sat, 21 Jan 1995 06:25:31 GMT
E-MAIL SECURITY WITH PGP AND PEM:
HOW TO KEEP YOUR ELECTRONIC MESSAGES PRIVATE
...a new book by Bruce Schneier
John Wiley & Sons, 1995
ISBN 0-471-05318-X
$24.95
The world of e-mail is the world of postcards. Between you and
your correspondents may lurk a foreign government, a business
competitor, an overzealous law enforcement agency, or even just a
nosy neighbor. The problem is, all of these potential
eavesdroppers, given fairly simple access tools, can read your
messages as easy as a postal worker can read your postcards.
E-MAIL SECURITY is about protecting electronic mail fm spies,
interlopers, and spoofs--people who may want to destroy, alter,
or just look at your private communications. The book shows how
you can protect the financial information, contract negotiations,
or personal correspondence you entrust to public or private
networks--and it shows how this protection is available right
now, with free or inexpensive software.
The book discusses PGP and PEM: how they work, how they are
different, and how to choose which one is right for you.
TABLE OF CONTENTS:
Part I: Privacy and Electronic Mail
Chapter 1: The Problem
Chapter 2: Encryption
Chapter 3: Key Management
Chapter 4: Authentication
Chapter 5: Certificates
Chapter 6: Keeping Your Private Key Private
Chapter 7: Odds and Ends
Chapter 8: Patents, Governments, and Export Laws
Part II: Achieving Electronic-Mail Privacy
Chapter 9: Requirements and Features
Chapter 10: Privacy Enhanced Mail (PEM)
Chapter 11: Pretty Good Privacy (PGP)
Chapter 12: Comparing PGP and PEM
Chapter 13: Attacks Against PGP and PEM
Appendix A: Pretty Good Privacy
Appendix B: Privacy Enhanced Mail
*****************************************************************
If you are interested in a copy of E-MAIL SECURITY, please send a
check for $25 + $5 postage (ask for rates abroad) to:
Bruce Schneier
730 Fair Oaks Ave
Oak Park, IL 60302
The book won't be available until at least the end of the month,
so please be patient.
Return to January 1995
Return to “werewolf@io.org (Mark Terka)”
1995-01-22 (Sun, 22 Jan 95 14:07:16 PST) - Another Book By Schneier… - werewolf@io.org (Mark Terka)