Digital Privacy
Paladin Press,U.S. (Verlag)
978-0-87364-774-8 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
M.L. Shannon's lifelong interest in communications led him to work as a technician for a company that made surveillance and countermeasures gear as well as for a professional countermeasures company. He is well versed on privacy issues.
Introduction Is the Book Necessary? Not the Last Word Part I DATA ENCRYPTION Do You Need Data Encryption? Why Do You Need PGP? A History of Computers The Tube The Transistor Satellites and Atom Bombs Red Apples, Big Blue, & Green Acres A History of Ciphers What is a Cipher? Types of Ciphers The Vigenere The Verham The Playfair The Bazeries The Enigma The RSA & DES Algorithms RSA Programs MailSafe Iris Pretty Good Privacy The Public Key System How the Public Key System Works The RSA Digital Envelope The RSA Digital Signature Public Key Management The Data Encryption Standard Why 56? How The DES Works Using the DES DES Program How Secure are Encryption Programs? So What Is It? It Ain't Necessarily So A Tale of Terrorists Beware of Snake Oil Breaking The RSA Breaking The DES Speculation Double Encryption The Whitening of the Keys The Key to the Keys Your Own Secret Code Pocket Databases and Race Horses So Who Cares? Espionage! Someone Cares Confusing The Datanappers The Spooks in the Cellar Attack! Trickery Dictionaries RUPA and the Average Bell Boilerplate Data Compression Which Program is Right For Me? DOS, Macintosh or Unix? RSAREF and RIPEM Some Programs Reviewed Dolphin Encrypt Encrypt-It for Windows File Encrypt DES The Iris DES The Iris Public Key Program MailSafe Public Key Program MailSafe Command Line The PGP Public Key Program The Private Lines DES SuperCrypt DES Shakedown The DES Compatibility Test The Speed Test Running Under Windows Cost Encrypting Graphics Files System Requirements No Guarantees Recommendations Encryption & the Law Part II THEFT AND PREVENTION Alarms and Locks Gadgets and Gimmicks Booby Traps, Booby Hatches and Barristers An Inside Job Access Control The Stacker Attacker Defeater Data To Go Portable Computers Part III THE INVASION OF THE DATANAPPERS Neural Networking Computers And Then Along Came Sears Wiretappers and Windmills The van Eck Monitor Monitor How it Works TEMPEST It's Not Just the Monitor Van Eck Frequencies Where to Get Monitor Monitors Commercial Systems Home Made Systems Generating Sync Signals How Well Do These Things Really Work? More Trickery Prevention Van Eck Monitoring & the Law Wiretapping and Data The Cellular Broadcasting Co. Networks and Noses E-mail and the Law Hackers and Passwords The Unix Tripwire The Private Hobby BBS Business Systems An Unbreakable System A Breakable System How the Hack Do I? War Games Dialers Overlord CAMA Traps & Pen Registers What's a Hacker To Do? On The Other End Sick Systems Part IV EVERYTHING ELSE Do You Need Professional Help? The Internet The Hatfields & the McCoys Patent Rights on the Algorithm Risks of Using the PGP Notes Credits Suggested Reading Electronic Magazines Books Computer Crime Cryptography Articles General Super Computers The NIST DSS Big Brother Laces to Get Things Super Computers The DES Fact Sheet How the XOR Works Also From Lysias Press Glossary of Terms
Erscheint lt. Verlag | 1.7.1993 |
---|---|
Zusatzinfo | illustrations |
Verlagsort | Colorado |
Sprache | englisch |
Maße | 216 x 280 mm |
Gewicht | 481 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-87364-774-2 / 0873647742 |
ISBN-13 | 978-0-87364-774-8 / 9780873647748 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich