638808

9780873647748

Digital Privacy

Digital Privacy
$89.99
$3.95 Shipping
  • Condition: Good
  • Provider: Bonita Contact
  • Provider Rating:
    0%
  • Ships From: Multiple Locations
  • Shipping: Standard
  • Comments: Access codes and supplements are not guaranteed with used items. May be an ex-library book.

seal  

Ask the provider about this item.

Most renters respond to questions in 48 hours or less.
The response will be emailed to you.
Cancel
  • ISBN-13: 9780873647748
  • ISBN: 0873647742
  • Publisher: Paladin Press

AUTHOR

Shannon, M. L.

SUMMARY

IntroductionIs the Book Necessary?Not the Last WordPart I DATA ENCRYPTIONDo You Need Data Encryption?Why Do You Need PGP?A History of ComputersThe TubeThe TransistorSatellites and Atom BombsRed Apples, Big Blue, & Green AcresA History of CiphersWhat is a Cipher?Types of CiphersThe VigenereThe VerhamThe PlayfairThe BazeriesThe EnigmaThe RSA & DES AlgorithmsRSA ProgramsMailSafeIrisPretty Good PrivacyThe Public Key SystemHow the Public Key System WorksThe RSA Digital EnvelopeThe RSA Digital SignaturePublic Key ManagementThe Data Encryption StandardWhy 56?How The DES WorksUsing the DESDES ProgramHow Secure are Encryption Programs?So What Is It?It Ain't Necessarily SoA Tale of TerroristsBeware of Snake OilBreaking The RSABreaking The DESSpeculationDouble EncryptionThe Whitening of the KeysThe Key to the KeysYour Own Secret CodePocket Databases and Race HorsesSo Who Cares?Espionage!Someone CaresConfusing The DatanappersThe Spooks in the CellarAttack!TrickeryDictionariesRUPA and the Average BellBoilerplateData CompressionWhich Program is Right For Me?DOS, Macintosh or Unix?RSAREF and RIPEMSome Programs ReviewedDolphin EncryptEncrypt-It for WindowsFile Encrypt DESThe Iris DESThe Iris Public Key ProgramMailSafe Public Key ProgramMailSafe Command LineThe PGP Public Key ProgramThe Private Lines DESSuperCrypt DESShakedownThe DES Compatibility TestThe Speed TestRunning Under WindowsCostEncrypting Graphics FilesSystem RequirementsNo GuaranteesRecommendationsEncryption & the LawPart II THEFT AND PREVENTIONAlarms and LocksGadgets and GimmicksBooby Traps, Booby Hatches and BarristersAn Inside JobAccess ControlThe Stacker Attacker DefeaterData To GoPortable ComputersPart III THE INVASION OF THE DATANAPPERSNeural Networking ComputersAnd Then Along Came SearsWiretappers and WindmillsThe van Eck Monitor MonitorHow it WorksTEMPESTIt's Not Just the MonitorVan Eck FrequenciesWhere to Get Monitor MonitorsCommercial SystemsHome Made SystemsGenerating Sync SignalsHow Well Do These Things Really Work?More TrickeryPreventionVan Eck Monitoring & the LawWiretapping and DataThe Cellular Broadcasting Co.Networks and NosesE-mail and the LawHackers and PasswordsThe Unix TripwireThe Private Hobby BBSBusiness SystemsAn Unbreakable SystemA Breakable SystemHow the Hack Do I?War Games DialersOverlordCAMATraps & Pen RegistersWhat's a Hacker To Do?On The Other EndSick SystemsPart IV EVERYTHING ELSEDo You Need Professional Help?The InternetThe Hatfields & the McCoysPatent Rights on the AlgorithmRisks of Using the PGPNotesCreditsSuggested ReadingElectronic MagazinesBooksComputer CrimeCryptographyArticlesGeneralSuper ComputersThe NIST DSSBig BrotherLaces to Get ThingsSuper ComputersThe DES Fact SheetHow the XOR WorksAlso From Lysias PressGlossary of TermsShannon, M. L. is the author of 'Digital Privacy' with ISBN 9780873647748 and ISBN 0873647742.

[read more]

Questions about purchases?

You can find lots of answers to common customer questions in our FAQs

View a detailed breakdown of our shipping prices

Learn about our return policy

Still need help? Feel free to contact us

View college textbooks by subject
and top textbooks for college

The ValoreBooks Guarantee

The ValoreBooks Guarantee

With our dedicated customer support team, you can rest easy knowing that we're doing everything we can to save you time, money, and stress.