PGP: Pretty Good Privacy

PGP: Pretty Good Privacy
Author: Simson Garfinkel
Publisher: "O'Reilly Media, Inc."
Total Pages: 442
Release: 1995
Genre: Computers
ISBN: 9781565920989

Pretty Good Privacy, or "PGP", is an encryption program widely available on the Internet. The program runs on MS-DOS, UNIX, and the Mac. PGP: Pretty Good Privacy offers both a readable technical user's guide and a fascinating behind-the-scenes look at cryptography and privacy, explaining how to get PGP from publicly available sources and how to install it on various platforms.


PGP Source Code and Internals

PGP Source Code and Internals
Author: Philip R. Zimmermann
Publisher: MIT Press (MA)
Total Pages: 942
Release: 1995
Genre: Computers
ISBN:

PGP (Pretty Good Privacy) is a computer program for the encryption of data and electronic mail, a powerful envelope that allows individuals the same privacy in their communications as enjoyed by governments and large corporations. PGP, which is freely available on the Internet, uses public-key cryptography - specifically the RSA algorithm, which is particularly well-suited to the needs of computer-mediated communications. This book contains a formatted vesion of the complete source code for the latest release (2.6.2) of PGP.


The Official PGP User's Guide

The Official PGP User's Guide
Author: Philip R. Zimmermann
Publisher: MIT Press (MA)
Total Pages: 168
Release: 1995
Genre: Computers
ISBN:

Because cryptographic software is considered munitions by the U.S. government, and is thus subject to the same export restrictions as tanks and submarines, the worldwide distribution of PGP over the Internet has raised a host of issues that are addressed in the "User's Guide.".


PGP & GPG

PGP & GPG
Author: Michael Lucas
Publisher: No Starch Press
Total Pages: 218
Release: 2006
Genre: Computers
ISBN: 1593270712

No, you are not paranoid. They are out to read your email. In this engaging and oddly reassuring text, practitioner Lucas describes Pretty Good Privacy (PGP) and Open Source GPG for moderately skilled computer geeks who are unfamiliar with public-key cryptography but want a cheap solution to security woes. He covers cryptography, installing OPENPGP


End-to-End Encrypted Messaging

End-to-End Encrypted Messaging
Author: Rolf Oppliger
Publisher: Artech House
Total Pages: 359
Release: 2020-04-30
Genre: Computers
ISBN: 1630817333

This exciting resource introduces the core technologies that are used for Internet messaging. The book explains how Signal protocol, the cryptographic protocol that currently dominates the field of end to end encryption (E2EE) messaging, is implemented and addresses privacy issues related to E2EE messengers. The Signal protocol and its application in WhatsApp is explored in depth, as well as the different E2EE messengers that have been made available in the last decade are also presented, including SnapChat. It addresses the notion of self-destructing messages (as originally introduced by SnapChat) and the use of metadata to perform traffic analysis. A comprehensive treatment of the underpinnings of E2EE messengers, including Pretty Good Privacy (PGP) and OpenPGP as well as Secure/Multipurpose Internet Mail Extensions (S/MIME) is given to explain the roots and origins of secure messaging, as well as the evolutionary improvements to PGP/OpenPGP and S/MIME that have been proposed in the past. In addition to the conventional approaches to secure messaging, it explains the modern approaches messengers like Signal are based on. The book helps technical professionals to understand secure and E2EE messaging on the Internet, and to put the different approaches and solutions into perspective.


Beautiful Security

Beautiful Security
Author: Andy Oram
Publisher: "O'Reilly Media, Inc."
Total Pages: 304
Release: 2009-04-17
Genre: Computers
ISBN: 0596555547

Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and those defending against them must do the same. Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include: The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their prey How social networking, cloud computing, and other popular trends help or hurt our online security How metrics, requirements gathering, design, and law can take security to a higher level The real, little-publicized history of PGP This book includes contributions from: Peiter "Mudge" Zatko Jim Stickley Elizabeth Nichols Chenxi Wang Ed Bellis Ben Edelman Phil Zimmermann and Jon Callas Kathy Wang Mark Curphey John McManus James Routh Randy V. Sabett Anton Chuvakin Grant Geyer and Brian Dunphy Peter Wayner Michael Wood and Fernando Francisco All royalties will be donated to the Internet Engineering Task Force (IETF).


Defend Dissent

Defend Dissent
Author: Glencora Borradaile
Publisher:
Total Pages:
Release: 2021
Genre: Computer science
ISBN:


Crypto

Crypto
Author: Steven Levy
Publisher: Penguin
Total Pages: 604
Release: 2001-01-08
Genre: Computers
ISBN: 1101199466

If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy—the author who made "hackers" a household word—comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction.


The Computer Privacy Handbook

The Computer Privacy Handbook
Author: André Bacard
Publisher:
Total Pages: 296
Release: 1995
Genre: Computers
ISBN:

With millions of e-mail messages and online discussions exchanged daily on the Internet, electronic security has become a key concern. The Computer Privacy Handbook explains how computers have put our privacy in jeopardy and what practical steps individuals can take to safeguard their electronic security.