Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
PGP: Pretty Good Privacy

Buy
PGP: Pretty Good Privacy, 9781565920989 (1565920988), O'Reilly, 1994

Use of the Internet is expanding beyond anyone's expectations. As corporations, government offices, and ordinary citizens begin to rely on the information highway to conduct business, they are realizing how important it is to protect their communications -- both to keep them a secret from prying eyes and to ensure that they are not altered during transmission. Encryption, which until recently was an esoteric field of interest only to spies, the military, and a few academics, provides a mechanism for doing this.PGP, which stands for Pretty Good Privacy, is a free and widely available encryption program that lets you protect files and electronic mail. Written by Phil Zimmermann and released in 1991, PGP works on virtually every platform and has become very popular both in the U.S. and abroad. Because it uses state-of-the-art public key cryptography, PGP can be used to authenticate messages, as well as keep them secret. With PGP, you can digitally "sign" a message when you send it. By checking the digital signature at the other end, the recipient can be sure that the message was not changed during transmission and that the message actually came from you.PGP offers a popular alternative to U.S. government initiatives like the Clipper Chip because, unlike Clipper, it does not allow the government or any other outside agency access to your secret keys.PGP: Pretty Good Privacy by Simson Garfinkel is both a readable technical user's guide and a fascinating behind-the-scenes look at cryptography and privacy. Part I, "PGP Overview," introduces PGP and the cryptography that underlies it. Part II, "Cryptography History and Policy," describes the history of PGP -- its personalities, legal battles, and other intrigues; it also provides background on the battles over public key cryptography patents and the U.S. government export restrictions, and other aspects of the ongoing public debates about privacy and free speech. Part III, "Using PGP," describes how to use PGP: protecting files and email, creating and using keys, signing messages, certifying and distributing keys, and using key servers. Part IV, "Appendices," describes how to obtain PGP from Internet sites, how to install it on PCs, UNIX systems, and the Macintosh, and other background information. The book also contains a glossary, a bibliography, and a handy reference card that summarizes all of the PGP commands, environment variables, and configuration variables.

(HTML tags aren't allowed.)

Visual Basic 2005 with .NET 3.0 Programmer's Reference
Visual Basic 2005 with .NET 3.0 Programmer's Reference

With this completely up-to-date tutorial and reference, you'll quickly learn how to develop Visual Basic (VB) programs that leverage the latest features of Vista and .NET 3.0. The tutorial section walks you through VB.NET from scratch, providing you with in-depth descriptions of the development environment, basic program syntax, and standard...

Sams Teach Yourself J2EE in 21 Days, Second Edition
Sams Teach Yourself J2EE in 21 Days, Second Edition

J2EE has become required knowledge for any serious Java developer, but learning this large and complex specification requires a substantial investment of time and energy. Sams Teach Yourself J2EE in 21 Days presents the enterprise Java architecture in accessible, easy-to-comprehend lessons, describing how each J2EE tool solves the challenges of...

The Architecture of the Visible (Technologies: Studies in Culture & Theory Series)
The Architecture of the Visible (Technologies: Studies in Culture & Theory Series)
Soon after the launch of the first Sputnik in 1957, Hannah Arendt observed in The Human Condition that for the first time 'an earth-born object made by m a n . . . moved in the proximity of the heavenly bodies as though it had been admitted tentatively to their sublime company', an event which she described as 'second in importance to no other, not...

Learning Unix for OS X Mountain Lion: Using Unix and Linux Tools at the Command Line
Learning Unix for OS X Mountain Lion: Using Unix and Linux Tools at the Command Line
It’s been a long time since we went through the dramatic transition from Mac OS 9 to the more complicated and graphically rich world of OS X. Many of you reading this have never known a Mac interface that wasn’t actually OS X (pronounce that “oh-ess ten” to sound cool). The biggest change...
Game Programming for Teens
Game Programming for Teens

Hey, reader. Thanks for reading and/or buying my book. I am really thankful for it.

What is programming? Programming, according to Dictionary.com, is ‘‘a set of coded instructions that enables a machine, especially a computer, to perform a desired sequence of operations.’’ In other words, programming allows...

Microsoft Dynamics NAV Administration
Microsoft Dynamics NAV Administration

This book is a tutorial guide that illustrates the steps needed to install, configure, deploy, and administer Dynamics NAV. It shows you how to get started with Dynamics NAV and then gradually explains other admin tasks such as backing up and performance tuning, using practical examples. If you want to get started in administering Dynamics...

©2020 LearnIT (support@pdfchm.net) - Privacy Policy