Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools

Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools

    • $3.99
    • $3.99

Publisher Description

Booklet for anyone who wants to keep their email correspondence private and protect it from unauthorized access. Step-by-step guide explains how to ensure security of email communication by utilizing existing technology. Topics include: review of security features such as Authentication, Integrity, Non-Repudiation, and Confidentiality, explanation of cryptographic features such as digital signature and encryption, how to obtain free email certificate and install it on Outlook and iPhone, configuring Outlook and iPhone for email encryption, and more (Article: ~3,100 words). Table of Contents Introduction Part I: The “Theory” of Cryptographic Message Protection What is Public Key Encryption? What is Public Key Infrastructure? What is S/MIME? What is Digital Certificate? What Is Digital Signature? Security Features Provided by Digital Certificate: Difference between Encryption and Digital Signature Security Features Provided by Digital Signature Security Features Provided by Encryption Part II: Implementing Email Protection Obtaining Your Personal Email Certificate (Digital ID) Configuring Outlook Installing Email Certificate on iPhone Configuring Exchange Email Account on iPhone Sending Encrypted and Digitally Signed Email from Outlook Sending Encrypted and Digitally Signed Email from iPhone Obtaining Recipient Certificates Conclusion Encryption and Digital Signatures in Gmail Resources About the Author Slava Gomzin, CISSP, ECSP, Security+ has more than 15 years of professional experience in software development and application security. Slava Gomzin is Security Architect at Retalix USA. He lives in Dallas, Texas.

GENRE
Computers & Internet
RELEASED
2012
June 7
LANGUAGE
EN
English
LENGTH
15
Pages
PUBLISHER
Slava Gomzin
SELLER
Draft2Digital, LLC
SIZE
1
MB

More Books Like This

Encrypted Email Encrypted Email
2015
Stop Using Email Stop Using Email
2021
Good and Geeky Private Emails Good and Geeky Private Emails
2016
Encryption Encryption
2016
Web Services Security Web Services Security
2012
Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build
2012

More Books by Slava Gomzin

Hiding Web Traffic with SSH: How to Protect Your Internet Privacy Against Corporate Firewall or Insecure Wireless Hiding Web Traffic with SSH: How to Protect Your Internet Privacy Against Corporate Firewall or Insecure Wireless
2012
Hacking Point of Sale Hacking Point of Sale
2014
Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
2012
Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server
2012
Bitcoin for Nonmathematicians Bitcoin for Nonmathematicians
2016
Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build
2012