000733575 000__ 02913cam\a2200469Ii\4500 000733575 001__ 733575 000733575 005__ 20230306141052.0 000733575 006__ m\\\\\o\\d\\\\\\\\ 000733575 007__ cr\cn\nnnunnun 000733575 008__ 150812s2015\\\\sz\a\\\\ob\\\\000\0\eng\d 000733575 020__ $$a9783319213446$$qelectronic book 000733575 020__ $$a331921344X$$qelectronic book 000733575 020__ $$z9783319213439 000733575 0247_ $$a10.1007/978-3-319-21344-6$$2doi 000733575 035__ $$aSP(OCoLC)ocn917888709 000733575 035__ $$aSP(OCoLC)917888709 000733575 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dGW5XE$$dIDEBK$$dN$T$$dYDXCP$$dSNK$$dOCLCF$$dCDX$$dUPM$$dCOO 000733575 049__ $$aISEA 000733575 050_4 $$aTK5105.73 000733575 08204 $$a004.692$$223 000733575 1001_ $$aOrman, Hilarie,$$eauthor. 000733575 24510 $$aEncrypted email$$h[electronic resource] :$$bthe history and technology of message privacy /$$cHilarie Orman. 000733575 264_1 $$aCham :$$bSpringer,$$c2015. 000733575 300__ $$a1 online resource (vii, 103 pages) :$$billustrations. 000733575 336__ $$atext$$btxt$$2rdacontent 000733575 337__ $$acomputer$$bc$$2rdamedia 000733575 338__ $$aonline resource$$bcr$$2rdacarrier 000733575 4901_ $$aSpringerBriefs in computer science,$$x2191-5768 000733575 504__ $$aIncludes bibliographical references. 000733575 5050_ $$aConcepts -- History -- How Does Secure Email Work?.-Using Secure Email -- Living with Secure Email -- Conclusion. 000733575 506__ $$aAccess limited to authorized users. 000733575 520__ $$aThis SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the challenges in standardization, usability, and trust that interfere with the user experience for software protection. Chapters address the origins of email encryption and why email encryption is rarely used despite the myriad of its benefits -- benefits that cannot be obtained in any other way. The construction of a secure message and its entwining with public key technology are covered. Other chapters address both independent standards for secure email and how they work. The final chapters include a discussion of getting started with encrypted email and how to live with it. Written by an expert in software security and computer tools, Encrypted Email: The History and Technology of Message Privacy is designed for researchers and professionals working in email security and encryption. Advanced-level students interested in security and networks will also find the content valuable. 000733575 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed August 13, 2015). 000733575 650_0 $$aElectronic mail messages$$xSecurity measures. 000733575 650_0 $$aElectronic mail systems$$xSecurity measures. 000733575 650_0 $$aData encryption (Computer science) 000733575 77608 $$iPrint version:$$z9783319213439 000733575 830_0 $$aSpringerBriefs in computer science. 000733575 85280 $$bebk$$hSpringerLink 000733575 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-21344-6$$zOnline Access$$91397441.1 000733575 909CO $$ooai:library.usi.edu:733575$$pGLOBAL_SET 000733575 980__ $$aEBOOK 000733575 980__ $$aBIB 000733575 982__ $$aEbook 000733575 983__ $$aOnline 000733575 994__ $$a92$$bISE