000 | 02972nam a22004695i 4500 | ||
---|---|---|---|
999 |
_c200434467 _d52679 |
||
003 | DE-He213 | ||
005 | 20231104114415.0 | ||
007 | cr nn 008mamaa | ||
008 | 150808s2015 gw | s |||| 0|eng d | ||
020 |
_a9783319213446 _z978-3-319-21344-6 |
||
024 | 7 |
_a10.1007/978-3-319-21344-6 _2doi |
|
040 |
_aTR-AnTOB _beng _cTR-AnTOB _erda |
||
050 | 4 | _aQA76.9.D335 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema005.82 _223 |
|
100 | 1 |
_aOrman, Hilarie. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aEncrypted Email : _bThe History and Technology of Message Privacy / _cby Hilarie Orman. |
250 | _a1st ed. 2015. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 0 |
_aSpringerBriefs in Computer Science, _x2191-5768 |
|
505 | 0 | _aConcepts -- History -- How Does Secure Email Work?.-Using Secure Email -- Living with Secure Email -- Conclusion. | |
520 | _aThis SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the challenges in standardization, usability, and trust that interfere with the user experience for software protection. Chapters address the origins of email encryption and why email encryption is rarely used despite the myriad of its benefits -- benefits that cannot be obtained in any other way. The construction of a secure message and its entwining with public key technology are covered. Other chapters address both independent standards for secure email and how they work. The final chapters include a discussion of getting started with encrypted email and how to live with it. Written by an expert in software security and computer tools, Encrypted Email: The History and Technology of Message Privacy is designed for researchers and professionals working in email security and encryption. Advanced-level students interested in security and networks will also find the content valuable. | ||
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputer security. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 1 | 4 |
_aCryptology. _0http://scigraph.springernature.com/things/product-market-codes/I28020 |
650 | 2 | 4 |
_aSystems and Data Security. _0http://scigraph.springernature.com/things/product-market-codes/I28060 |
650 | 2 | 4 |
_aComputer Communication Networks. _0http://scigraph.springernature.com/things/product-market-codes/I13022 |
710 | 2 | _aSpringerLink (Online service) | |
856 | 4 | 0 |
_3Springer eBooks _zOnline access link to the resource _uhttps://doi.org/10.1007/978-3-319-21344-6 |
942 |
_2lcc _cEBK |
||
041 | _aeng |