Categories

Categories

Additional Information

Additional Information
  • Home

Account Navigation

Account Navigation

Currency - All prices are in AUD

Currency - All prices are in AUD
 Loading... Please wait...
  • Call us on (US) 1.877.772.2536 or (AU) 07 32052596
  • My Account
The Art of Service

Categories

Categories

Email Encryption: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

$39.95

Email Encryption: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

$39.95

Product Description

E-mail encryption refers to encryption, and often authentication, of e-mail messages, which can be done in order to protect the content from being read by unintended recipients.

Technology for email is readily available (see below), but has not achieved widespread adoption, apparently due to social factors, such as people seeing the use of encryption as paranoid, and as marking a message urgent whether it is or not (Gaw et al, 2006).

E-mail encryption can rely on public-key cryptography, in which users can each publish a public key that others can use to encrypt messages to them; while keeping secret a private key they can use to decrypt such messages or to digitally encrypt and sign messages they send.

This book is your ultimate resource for Email Encryption. Here you will find the most up-to-date information, analysis, background and everything you need to know.

E-mail encryption refers to encryption, and often authentication, of e-mail messages, which can be done in order to protect the content from being read by unintended recipients.

Technology for email is readily available (see below), but has not achieved widespread adoption, apparently due to social factors, such as people seeing the use of encryption as paranoid, and as marking a message urgent whether it is or not (Gaw et al, 2006).

E-mail encryption can rely on public-key cryptography, in which users can each publish a public key that others can use to encrypt messages to them; while keeping secret a private key they can use to decrypt such messages or to digitally encrypt and sign messages they send.

This book is your ultimate resource for Email Encryption. Here you will find the most up-to-date information, analysis, background and everything you need to know.

In easy to read chapters, with extensive references and links to get you to know all there is to know about Email Encryption right away, covering: E-mail encryption, E-mail authentication, Anti-Spam Research Group, Author Domain Signing Practices, Backscatter (e-mail), Bounce address, Bounce Address Tag Validation, Certified Senders Alliance, Certified Server Validation, CRAM-MD5, DNSWL, DomainKeys, DomainKeys Identified Mail, Forward-confirmed reverse DNS, Hashcash, Ident, MAAWG, Mail submission agent, MARID, Non delivery report, POP before SMTP, Pretty Good Privacy, Public Key Name Service, S/MIME, Sender ID, Sender Policy Framework, Sender Rewriting Scheme, SMTP Authentication, Vouch by Reference, E-mail privacy, Secure messaging, Crypto heaven, Enigmail, GPGMail, Entrust, Echoworx.  

This book explains in-depth the real drivers and workings of Email Encryption. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Email Encryption with the objectivity of experienced professionals.

Product Reviews

Find Similar Products by Category