Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools by Slava Gomzin, Slava Gomzin
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Slava Gomzin ISBN: 9781476285184
Publisher: Slava Gomzin Publication: June 7, 2012
Imprint: Smashwords Edition Language: English
Author: Slava Gomzin
ISBN: 9781476285184
Publisher: Slava Gomzin
Publication: June 7, 2012
Imprint: Smashwords Edition
Language: English

Booklet for anyone who wants to keep their email correspondence private and protect it from unauthorized access. Step-by-step guide explains how to ensure security of email communication by utilizing existing technology.

Topics include: review of security features such as Authentication, Integrity, Non-Repudiation, and Confidentiality, explanation of cryptographic features such as digital signature and encryption, how to obtain free email certificate and install it on Outlook and iPhone, configuring Outlook and iPhone for email encryption, and more (Article: ~3,100 words).

Table of Contents

Introduction
Part I: The “Theory” of Cryptographic Message Protection
What is Public Key Encryption?
What is Public Key Infrastructure?
What is S/MIME?
What is Digital Certificate?
What Is Digital Signature?
Security Features Provided by Digital Certificate: Difference between Encryption and Digital Signature
Security Features Provided by Digital Signature
Security Features Provided by Encryption
Part II: Implementing Email Protection
Obtaining Your Personal Email Certificate (Digital ID)
Configuring Outlook
Installing Email Certificate on iPhone
Configuring Exchange Email Account on iPhone
Sending Encrypted and Digitally Signed Email from Outlook
Sending Encrypted and Digitally Signed Email from iPhone
Obtaining Recipient Certificates
Conclusion
Encryption and Digital Signatures in Gmail
Resources
About the Author

Slava Gomzin, CISSP, PCI ISA, PCIP, ECSP, Security+ has more than 15 years of professional experience in software development and security including
12 years in application development for retail industry and electronic payments,
10 years in .NET and SQL Server development,
6 years in application security and PCI compliance.
Slava Gomzin is Security Architect at Retalix USA. He lives in Dallas, Texas.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Booklet for anyone who wants to keep their email correspondence private and protect it from unauthorized access. Step-by-step guide explains how to ensure security of email communication by utilizing existing technology.

Topics include: review of security features such as Authentication, Integrity, Non-Repudiation, and Confidentiality, explanation of cryptographic features such as digital signature and encryption, how to obtain free email certificate and install it on Outlook and iPhone, configuring Outlook and iPhone for email encryption, and more (Article: ~3,100 words).

Table of Contents

Introduction
Part I: The “Theory” of Cryptographic Message Protection
What is Public Key Encryption?
What is Public Key Infrastructure?
What is S/MIME?
What is Digital Certificate?
What Is Digital Signature?
Security Features Provided by Digital Certificate: Difference between Encryption and Digital Signature
Security Features Provided by Digital Signature
Security Features Provided by Encryption
Part II: Implementing Email Protection
Obtaining Your Personal Email Certificate (Digital ID)
Configuring Outlook
Installing Email Certificate on iPhone
Configuring Exchange Email Account on iPhone
Sending Encrypted and Digitally Signed Email from Outlook
Sending Encrypted and Digitally Signed Email from iPhone
Obtaining Recipient Certificates
Conclusion
Encryption and Digital Signatures in Gmail
Resources
About the Author

Slava Gomzin, CISSP, PCI ISA, PCIP, ECSP, Security+ has more than 15 years of professional experience in software development and security including
12 years in application development for retail industry and electronic payments,
10 years in .NET and SQL Server development,
6 years in application security and PCI compliance.
Slava Gomzin is Security Architect at Retalix USA. He lives in Dallas, Texas.

More books from Application Software

Cover of the book Building Trust in Information by Slava Gomzin
Cover of the book Geschlechtskonstruktion über Avatare in Second Life by Slava Gomzin
Cover of the book Intelligent Document Capture with Ephesoft by Slava Gomzin
Cover of the book Microsoft Word: Customizing the Quick Access Toolbar, Equations, Underline Styles, Insert Menu, Table, Page Layout, Formatting a Document, Edit Manuscript, and Preparation of an eBook for Publishing by Slava Gomzin
Cover of the book 50 Top IT Project Management Challenges by Slava Gomzin
Cover of the book Instant IBM Lotus Notes 8.5.3 How-to by Slava Gomzin
Cover of the book Take Control of Lightroom CC by Slava Gomzin
Cover of the book Learning Tableau by Slava Gomzin
Cover of the book 15 MOST POWERFUL FEATURES OF PIVOT TABLES! by Slava Gomzin
Cover of the book Functional and Phylogenetic Ecology in R by Slava Gomzin
Cover of the book Detection of Intrusions and Malware, and Vulnerability Assessment by Slava Gomzin
Cover of the book Secure and Trustworthy Transportation Cyber-Physical Systems by Slava Gomzin
Cover of the book Python Geospatial Analysis Essentials by Slava Gomzin
Cover of the book First Steps in the SAP Purchasing Processes (MM) by Slava Gomzin
Cover of the book Advanced Photoshop CC for Design Professionals Digital Classroom by Slava Gomzin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy