Because cryptographic software is considered munitions by the U.S. government, and is thus subject to the same export restrictions as tanks and submarines, the worldwide distribution of PGP over the Internet has raised a host of issues that are addressed in the "User's Guide.".
The user's manual for PGP (Pretty Good Privacy) public-key cryptography software, freely available over the Internet, that has become the de facto standard for the encryption of electronic mail and data. Because cryptographic software is subject to the same export restrictions as tanks and submarines, the worldwide distribution of PGP over the Internet has raised a host of issues that are addressed in this guide. In addition to technical details, it contains valuable insights into the social engineering behind the software engineering and into the legal, ethical, and political issues that have surrounded PGP since its initial release.
Pretty Good Privacy, or "PGP", is an encryption program widely available on the Internet. The program runs on MS-DOS, UNIX, and the Mac. PGP: Pretty Good Privacy offers both a readable technical user's guide and a fascinating behind-the-scenes look at cryptography and privacy, explaining how to get PGP from publicly available sources and how to install it on various platforms.
PGP (Pretty Good Privacy) is a computer program for the encryption of data and electronic mail, a powerful envelope that allows individuals the same privacy in their communications as enjoyed by governments and large corporations. PGP, which is freely available on the Internet, uses public-key cryptography - specifically the RSA algorithm, which is particularly well-suited to the needs of computer-mediated communications. This book contains a formatted vesion of the complete source code for the latest release (2.6.2) of PGP.
The Certified Information Systems Security Professional (CISSP) is the industry standard test on IT security. This guide helps security professionals prepare for the exam while providing a reference on key information security areas.
In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy. Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world's most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.
This updated bestseller features new, more focused review material for the leading computer security certification-the Certified Information Systems Security Professional, or CISSP The first book on the market to offer comprehensive review material for the Information Systems Security Engineering Professional (ISSEP) subject concentration, a new CISSP credential that's now required for employees and contractors of the National Security Agency (NSA) and will likely be adopted soon by the FBI, CIA, Department of Defense, and Homeland Security Department The number of CISSPs is expected to grow by fifty percent in 2004 The CD-ROM includes the Boson-powered interactive test engine practice sets for CISSP and ISSEP
This volume features the refereed proceedings of the 4th International Conference on Trust and Privacy in Digital Business. The 28 papers were all carefully reviewed. They cover privacy and identity management, security and risk management, security requirements and development, privacy enhancing technologies and privacy management, access control models, trust and reputation, security protocols, and security and privacy in mobile environments.
This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style; each containing which contains a comprehensive overview, the latest pioneering work and future research direction of a research topic.
Assesses the battles over Internet regulation that will define the venue's future Who will rule cyberspace? And why should people care? Recently stories have appeared in a variety of news media, from the sensational to the staid, that portray the Internet as full of pornography, pedophilia, recipes for making bombs, lewd and lawless behavior, and copyright violators. And, for politicians eager for votes, or to people who have never strolled the electronic byways, regulating the Net seems as logical and sensible as making your kids wear seat belts. Forget freedom of speech: children can read this stuff. From the point of view of those on the Net, mass-media's representation of pornography on the Internet grossly overestimates the amount that is actually available, and these stories are based on studies that are at best flawed and at worst fraudulent. To netizens, the panic over the electronic availability of bomb-making recipes and other potentially dangerous material is groundless: the same material is readily available in public libraries. Out on the Net, it seems outrageous that people who have never really experienced it are in a position to regulate it. How then, should the lines be drawn in the grey area between cyberspace and the physical world? In net.wars, Wendy Grossman, a journalist who has covered the Net since 1992 for major publications such as Wired, The Guardian, and The Telegraph, assesses the battles that will define the future of this new venue. From the Church of Scientology's raids on Net users to netizens attempts to overthrow both the Communications Decency Act and the restrictions on the export of strong encryption, net.wars explains the issues and the background behind the headlines. Among the issues covered are net scams, class divisions on the net, privacy issues, the Communications Decency Act, women online, pornography, hackers and the computer underground, net criminals and sociopaths, and more. Full text online version at www.nyupress.org/netwars.