Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
PGP: Pretty Good Privacy

Buy
PGP: Pretty Good Privacy, 9781565920989 (1565920988), O'Reilly, 1994

Use of the Internet is expanding beyond anyone's expectations. As corporations, government offices, and ordinary citizens begin to rely on the information highway to conduct business, they are realizing how important it is to protect their communications -- both to keep them a secret from prying eyes and to ensure that they are not altered during transmission. Encryption, which until recently was an esoteric field of interest only to spies, the military, and a few academics, provides a mechanism for doing this.PGP, which stands for Pretty Good Privacy, is a free and widely available encryption program that lets you protect files and electronic mail. Written by Phil Zimmermann and released in 1991, PGP works on virtually every platform and has become very popular both in the U.S. and abroad. Because it uses state-of-the-art public key cryptography, PGP can be used to authenticate messages, as well as keep them secret. With PGP, you can digitally "sign" a message when you send it. By checking the digital signature at the other end, the recipient can be sure that the message was not changed during transmission and that the message actually came from you.PGP offers a popular alternative to U.S. government initiatives like the Clipper Chip because, unlike Clipper, it does not allow the government or any other outside agency access to your secret keys.PGP: Pretty Good Privacy by Simson Garfinkel is both a readable technical user's guide and a fascinating behind-the-scenes look at cryptography and privacy. Part I, "PGP Overview," introduces PGP and the cryptography that underlies it. Part II, "Cryptography History and Policy," describes the history of PGP -- its personalities, legal battles, and other intrigues; it also provides background on the battles over public key cryptography patents and the U.S. government export restrictions, and other aspects of the ongoing public debates about privacy and free speech. Part III, "Using PGP," describes how to use PGP: protecting files and email, creating and using keys, signing messages, certifying and distributing keys, and using key servers. Part IV, "Appendices," describes how to obtain PGP from Internet sites, how to install it on PCs, UNIX systems, and the Macintosh, and other background information. The book also contains a glossary, a bibliography, and a handy reference card that summarizes all of the PGP commands, environment variables, and configuration variables.

(HTML tags aren't allowed.)

Vector Basic Training: A Systematic Creative Process for Building Precision Vector Artwork
Vector Basic Training: A Systematic Creative Process for Building Precision Vector Artwork

The one question I get asked most by other creatives is, “How do you get your vector artwork to look so nice?” When people ask me this, they’re not talking about any specific art project or illustration, but rather how I go about building my artwork in vector format so precisely.

Truth is that many...

Implementierung von IT Service-Management: Erfolgsfaktoren aus nationalen und internationalen Fallstudien
Implementierung von IT Service-Management: Erfolgsfaktoren aus nationalen und internationalen Fallstudien

Bisher wurde das IT Service-Management in der öffentlichen Verwaltung in Deutschland nur am Rande behandelt. In diesem Buch geben die Autoren einen umfassenden Einblick in die bisherigen Fortschritte bei der Implementierung von IT-Prozessen in öffentlichen Einrichtungen und arbeiten, basierend auf fünf Fallstudien,...

A FAREWELL TO ENTROPY: Statistical Thermodynamics Based on Information
A FAREWELL TO ENTROPY: Statistical Thermodynamics Based on Information
The principal message of this book is that thermodynamics and statistical mechanics will benefit from replacing the unfortunate, misleading and mysterious term entropy with a more familiar, meaningful and appropriate term such as information, missing information or uncertainty. This replacement would facilitate the interpretation of the driving...

Application Development Using C# and .NET
Application Development Using C# and .NET
Microsoft .NET is an advance in programming technology that greatly simplifies application development both for traditional, proprietary applications, and for the emerging paradigm of Web-based services. .NET is a complete restructuring of Microsoft's whole system infrastructure and represents a major learning challenge for programmers developing...
Static Analysis of Software: The Abstract Interpretation (ISTE)
Static Analysis of Software: The Abstract Interpretation (ISTE)

The existing literature currently available to students and researchers is very general, covering only the formal techniques of static analysis.

This book presents real examples of the formal techniques called "abstract interpretation" currently being used in various industrial fields: railway, aeronautics, space,...

Mathematica Navigator: Mathematics, Statistics and Graphics, Third Edition
Mathematica Navigator: Mathematics, Statistics and Graphics, Third Edition
Ruskeepaa gives a general introduction to the most recent versions of Mathematica, the symbolic computation software from Wolfram. The book emphasizes graphics, methods of applied mathematics and statistics, and programming.

Mathematica Navigator can be used both as a tutorial and as a handbook. While no previous experience with
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy