Secure Messaging on the Internet /:
This book offers a comprehensive understanding of secure Internet messaging, and brings together all the relevant and critical information needed to use OpenPGP and S/MIME-compliant software. It explores the conceptual and technical approaches followed by the developers of both OpenPGP and S/MIME, a...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston :
Artech House,
[2014]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This book offers a comprehensive understanding of secure Internet messaging, and brings together all the relevant and critical information needed to use OpenPGP and S/MIME-compliant software. It explores the conceptual and technical approaches followed by the developers of both OpenPGP and S/MIME, and gives a thorough treatment of the latest and most-effective technologies for secure messaging. Ideal for security and network managers, as well as professional system and network administrators, this easy-to-understand book is a complete guide to OpenPGP, S/MIME, Web-based and gateway solutions, |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9781608077182 1608077187 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn935983100 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 160125t20142014maua ob 001 0 eng d | ||
010 | |z 2014469159 | ||
040 | |a YDXCP |b eng |e pn |c YDXCP |d EBLCP |d CN3GA |d OCLCF |d COO |d OCLCQ |d D6H |d OCLCQ |d K6U |d LIV |d VVB |d N$T |d CUY |d UKAHL |d OCLCQ |d BRF |d OCLCQ |d OCLCO |d AAA |d OCLCO |d OCLCQ |d OCLCO |d INARC |d OCLCL |d OCLCQ | ||
019 | |a 949847063 |a 1412547681 | ||
020 | |a 9781608077182 |q (electronic bk.) | ||
020 | |a 1608077187 |q (electronic bk.) | ||
020 | |z 1608077179 | ||
020 | |z 9781608077175 | ||
035 | |a (OCoLC)935983100 |z (OCoLC)949847063 |z (OCoLC)1412547681 | ||
050 | 4 | |a TK5105.73 |b .O67 2014eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Oppliger, Rolf, |e author. |0 http://id.loc.gov/authorities/names/n96000042 | |
245 | 1 | 0 | |a Secure Messaging on the Internet / |c Rolf Oppliger. |
264 | 1 | |a Boston : |b Artech House, |c [2014] | |
264 | 4 | |c ©2014 | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
505 | 0 | |a Secure Messaging on the Internet; Contents; Preface; Acknowledgments; Chapter 1 Introduction; References; Chapter 2 Internet Messaging; 2.1 INTRODUCTION; 2.2 INTERNET MESSAGE FORMAT; 2.2.1 Header Section; 2.2.2 Message Body; 2.2.3 MIME; 2.3 INTERNET MESSAGING PROTOCOLS; 2.3.1 Message Transfer and Delivery; 2.3.2 Message Store Access; 2.3.3 Directory Access; 2.4 FINAL REMARKS; References; Chapter 3 Cryptographic Techniques; 3.1 INTRODUCTION; 3.1.1 Preliminary Remarks; 3.1.2 Cryptographic Systems; 3.1.3 Classes of Cryptographic Systems; 3.1.4 Secure Cryptosystems. | |
505 | 8 | |a 3.1.5 Historical Background Information3.2 CRYPTOSYSTEMS OVERVIEW; 3.2.1 Unkeyed Cryptosystems; 3.2.2 Secret Key Cryptosystems; 3.2.3 Public Key Cryptosystems; 3.3 FINAL REMARKS; References; Chapter 4 Certificate Management; 4.1 INTRODUCTION; 4.2 X.509 CERTIFICATES; 4.2.1 Certificate Format; 4.2.2 Hierarchical Trust Model; 4.3 OpenPGP CERTIFICATES; 4.3.1 Certificate Format; 4.3.2 Cumulative Trust Model; 4.4 FINAL REMARKS; References; Chapter 5 Secure Messaging ; 5.1 THREATS AND ATTACKS; 5.1.1 Passive Attacks; 5.1.2 Active Attacks; 5.2 SECURE MESSAGING. | |
505 | 8 | |a 5.2.1 What Does "Secure Messaging" Mean?5.2.2 How Can "Secure Messaging" Be Implemented?; 5.3 FINAL REMARKS; References; Chapter 6 OpenPGP ; 6.1 ORIGINS AND HISTORY; 6.2 TECHNOLOGY; 6.2.1 Preliminary Remarks; 6.2.2 Key ID; 6.2.3 Message Format; 6.2.4 PGP/MIME; 6.2.5 Supported Algorithms; 6.2.6 Message Processing; 6.2.7 Cryptographic Keys; 6.3 WEB OF TRUST; 6.3.1 Keyrings; 6.3.2 Trust Establishment; 6.3.3 Key Revocation; 6.3.4 Key Servers; 6.4 SECURITY ANALYSIS; 6.4.1 Specification; 6.4.2 Implementations; 6.5 FINAL REMARKS; References; Chapter 7 S/MIME ; 7.1 ORIGINS AND HISTORY; 7.2 TECHNOLOGY. | |
505 | 8 | |a 7.2.1 Message Formats7.2.2 Cryptographic Algorithms; 7.2.3 Attributes; 7.2.4 Enhanced Security Services; 7.3 CERTIFICATES; 7.4 SECURITY ANALYSIS; 7.5 FINAL REMARKS; References; Chapter 8 Web-Based Messaging ; 8.1 INTRODUCTION; 8.2 SERVICE PROVIDERS; 8.3 FINAL REMARKS; References; Chapter 9 Gateway Solutions; 9.1 INTRODUCTION; 9.2 PRODUCTS AND SOLUTIONS; 9.2.1 Totemomail Encryption Gateway; 9.2.2 SEPPmail; 9.3 FINAL REMARKS; Reference; Chapter 10 Certified Mail ; 10.1 INTRODUCTION; 10.2 SOLUTIONS; 10.2.1 Ad Hoc Solutions; 10.2.2 TTP-Based Solutions; 10.3 MESSAGE DELIVERY PLATFORMS. | |
505 | 8 | |a 10.4 FINAL REMARKSReferences; Chapter 11 Instant Messaging; 11.1 INTRODUCTION; 11.2 IM SECURITY; 11.3 OFF-THE-RECORDMESSAGING; 11.4 FINAL REMARKS; References; Chapter 12 Research Challenges and Open Questions; 12.1 SPAM PROTECTION; 12.2 P2P PRINCIPLES AND TECHNOLOGIES; 12.3 NEW APPROACHES AND ARCHITECTURES; References; Chapter 13 Conclusions and Outlook; Appendix A Character Sets; A.1 ASCII; A.2 ISO/IEC 8859; A.3 UNICODE; A.4 ISO/IEC 10646-1, UCS, AND UTF-8; Reference; Appendix B Transfer Encoding Schemes; B.1 QUOTED-PRINTABLE; B.2 UU; B.3 BASE-64; B.4 RADIX-64; Reference. | |
520 | |a This book offers a comprehensive understanding of secure Internet messaging, and brings together all the relevant and critical information needed to use OpenPGP and S/MIME-compliant software. It explores the conceptual and technical approaches followed by the developers of both OpenPGP and S/MIME, and gives a thorough treatment of the latest and most-effective technologies for secure messaging. Ideal for security and network managers, as well as professional system and network administrators, this easy-to-understand book is a complete guide to OpenPGP, S/MIME, Web-based and gateway solutions, | ||
504 | |a Includes bibliographical references. | ||
546 | |a Text in English. | ||
650 | 0 | |a Electronic mail messages |x Security measures. | |
650 | 6 | |a Courrier électronique |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Electronic mail messages |x Security measures |2 fast | |
776 | 0 | 8 | |i Print version: |a Oppliger, Rolf. |t Secure Messaging on the Internet. |d Boston : Artech House, [2014] |z 1608077179 |z 9781608077175 |w (DLC) 2014469159 |w (OCoLC)876671550 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1155192 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH30683808 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL1770468 | ||
938 | |a EBSCOhost |b EBSC |n 1155192 | ||
938 | |a IEEE |b IEEE |n 9100806 | ||
938 | |a YBP Library Services |b YANK |n 12810340 | ||
938 | |a Internet Archive |b INAR |n securemessagingo0000oppl | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn935983100 |
---|---|
_version_ | 1816882337514782720 |
adam_text | |
any_adam_object | |
author | Oppliger, Rolf |
author_GND | http://id.loc.gov/authorities/names/n96000042 |
author_facet | Oppliger, Rolf |
author_role | aut |
author_sort | Oppliger, Rolf |
author_variant | r o ro |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.73 .O67 2014eb |
callnumber-search | TK5105.73 .O67 2014eb |
callnumber-sort | TK 45105.73 O67 42014EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Secure Messaging on the Internet; Contents; Preface; Acknowledgments; Chapter 1 Introduction; References; Chapter 2 Internet Messaging; 2.1 INTRODUCTION; 2.2 INTERNET MESSAGE FORMAT; 2.2.1 Header Section; 2.2.2 Message Body; 2.2.3 MIME; 2.3 INTERNET MESSAGING PROTOCOLS; 2.3.1 Message Transfer and Delivery; 2.3.2 Message Store Access; 2.3.3 Directory Access; 2.4 FINAL REMARKS; References; Chapter 3 Cryptographic Techniques; 3.1 INTRODUCTION; 3.1.1 Preliminary Remarks; 3.1.2 Cryptographic Systems; 3.1.3 Classes of Cryptographic Systems; 3.1.4 Secure Cryptosystems. 3.1.5 Historical Background Information3.2 CRYPTOSYSTEMS OVERVIEW; 3.2.1 Unkeyed Cryptosystems; 3.2.2 Secret Key Cryptosystems; 3.2.3 Public Key Cryptosystems; 3.3 FINAL REMARKS; References; Chapter 4 Certificate Management; 4.1 INTRODUCTION; 4.2 X.509 CERTIFICATES; 4.2.1 Certificate Format; 4.2.2 Hierarchical Trust Model; 4.3 OpenPGP CERTIFICATES; 4.3.1 Certificate Format; 4.3.2 Cumulative Trust Model; 4.4 FINAL REMARKS; References; Chapter 5 Secure Messaging ; 5.1 THREATS AND ATTACKS; 5.1.1 Passive Attacks; 5.1.2 Active Attacks; 5.2 SECURE MESSAGING. 5.2.1 What Does "Secure Messaging" Mean?5.2.2 How Can "Secure Messaging" Be Implemented?; 5.3 FINAL REMARKS; References; Chapter 6 OpenPGP ; 6.1 ORIGINS AND HISTORY; 6.2 TECHNOLOGY; 6.2.1 Preliminary Remarks; 6.2.2 Key ID; 6.2.3 Message Format; 6.2.4 PGP/MIME; 6.2.5 Supported Algorithms; 6.2.6 Message Processing; 6.2.7 Cryptographic Keys; 6.3 WEB OF TRUST; 6.3.1 Keyrings; 6.3.2 Trust Establishment; 6.3.3 Key Revocation; 6.3.4 Key Servers; 6.4 SECURITY ANALYSIS; 6.4.1 Specification; 6.4.2 Implementations; 6.5 FINAL REMARKS; References; Chapter 7 S/MIME ; 7.1 ORIGINS AND HISTORY; 7.2 TECHNOLOGY. 7.2.1 Message Formats7.2.2 Cryptographic Algorithms; 7.2.3 Attributes; 7.2.4 Enhanced Security Services; 7.3 CERTIFICATES; 7.4 SECURITY ANALYSIS; 7.5 FINAL REMARKS; References; Chapter 8 Web-Based Messaging ; 8.1 INTRODUCTION; 8.2 SERVICE PROVIDERS; 8.3 FINAL REMARKS; References; Chapter 9 Gateway Solutions; 9.1 INTRODUCTION; 9.2 PRODUCTS AND SOLUTIONS; 9.2.1 Totemomail Encryption Gateway; 9.2.2 SEPPmail; 9.3 FINAL REMARKS; Reference; Chapter 10 Certified Mail ; 10.1 INTRODUCTION; 10.2 SOLUTIONS; 10.2.1 Ad Hoc Solutions; 10.2.2 TTP-Based Solutions; 10.3 MESSAGE DELIVERY PLATFORMS. 10.4 FINAL REMARKSReferences; Chapter 11 Instant Messaging; 11.1 INTRODUCTION; 11.2 IM SECURITY; 11.3 OFF-THE-RECORDMESSAGING; 11.4 FINAL REMARKS; References; Chapter 12 Research Challenges and Open Questions; 12.1 SPAM PROTECTION; 12.2 P2P PRINCIPLES AND TECHNOLOGIES; 12.3 NEW APPROACHES AND ARCHITECTURES; References; Chapter 13 Conclusions and Outlook; Appendix A Character Sets; A.1 ASCII; A.2 ISO/IEC 8859; A.3 UNICODE; A.4 ISO/IEC 10646-1, UCS, AND UTF-8; Reference; Appendix B Transfer Encoding Schemes; B.1 QUOTED-PRINTABLE; B.2 UU; B.3 BASE-64; B.4 RADIX-64; Reference. |
ctrlnum | (OCoLC)935983100 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05927cam a2200637 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn935983100</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|||||||||</controlfield><controlfield tag="008">160125t20142014maua ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2014469159</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">YDXCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">YDXCP</subfield><subfield code="d">EBLCP</subfield><subfield code="d">CN3GA</subfield><subfield code="d">OCLCF</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">K6U</subfield><subfield code="d">LIV</subfield><subfield code="d">VVB</subfield><subfield code="d">N$T</subfield><subfield code="d">CUY</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">BRF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AAA</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">949847063</subfield><subfield code="a">1412547681</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781608077182</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1608077187</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1608077179</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781608077175</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)935983100</subfield><subfield code="z">(OCoLC)949847063</subfield><subfield code="z">(OCoLC)1412547681</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.73</subfield><subfield code="b">.O67 2014eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oppliger, Rolf,</subfield><subfield code="e">author.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n96000042</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure Messaging on the Internet /</subfield><subfield code="c">Rolf Oppliger.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston :</subfield><subfield code="b">Artech House,</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Secure Messaging on the Internet; Contents; Preface; Acknowledgments; Chapter 1 Introduction; References; Chapter 2 Internet Messaging; 2.1 INTRODUCTION; 2.2 INTERNET MESSAGE FORMAT; 2.2.1 Header Section; 2.2.2 Message Body; 2.2.3 MIME; 2.3 INTERNET MESSAGING PROTOCOLS; 2.3.1 Message Transfer and Delivery; 2.3.2 Message Store Access; 2.3.3 Directory Access; 2.4 FINAL REMARKS; References; Chapter 3 Cryptographic Techniques; 3.1 INTRODUCTION; 3.1.1 Preliminary Remarks; 3.1.2 Cryptographic Systems; 3.1.3 Classes of Cryptographic Systems; 3.1.4 Secure Cryptosystems.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.1.5 Historical Background Information3.2 CRYPTOSYSTEMS OVERVIEW; 3.2.1 Unkeyed Cryptosystems; 3.2.2 Secret Key Cryptosystems; 3.2.3 Public Key Cryptosystems; 3.3 FINAL REMARKS; References; Chapter 4 Certificate Management; 4.1 INTRODUCTION; 4.2 X.509 CERTIFICATES; 4.2.1 Certificate Format; 4.2.2 Hierarchical Trust Model; 4.3 OpenPGP CERTIFICATES; 4.3.1 Certificate Format; 4.3.2 Cumulative Trust Model; 4.4 FINAL REMARKS; References; Chapter 5 Secure Messaging ; 5.1 THREATS AND ATTACKS; 5.1.1 Passive Attacks; 5.1.2 Active Attacks; 5.2 SECURE MESSAGING.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5.2.1 What Does "Secure Messaging" Mean?5.2.2 How Can "Secure Messaging" Be Implemented?; 5.3 FINAL REMARKS; References; Chapter 6 OpenPGP ; 6.1 ORIGINS AND HISTORY; 6.2 TECHNOLOGY; 6.2.1 Preliminary Remarks; 6.2.2 Key ID; 6.2.3 Message Format; 6.2.4 PGP/MIME; 6.2.5 Supported Algorithms; 6.2.6 Message Processing; 6.2.7 Cryptographic Keys; 6.3 WEB OF TRUST; 6.3.1 Keyrings; 6.3.2 Trust Establishment; 6.3.3 Key Revocation; 6.3.4 Key Servers; 6.4 SECURITY ANALYSIS; 6.4.1 Specification; 6.4.2 Implementations; 6.5 FINAL REMARKS; References; Chapter 7 S/MIME ; 7.1 ORIGINS AND HISTORY; 7.2 TECHNOLOGY.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">7.2.1 Message Formats7.2.2 Cryptographic Algorithms; 7.2.3 Attributes; 7.2.4 Enhanced Security Services; 7.3 CERTIFICATES; 7.4 SECURITY ANALYSIS; 7.5 FINAL REMARKS; References; Chapter 8 Web-Based Messaging ; 8.1 INTRODUCTION; 8.2 SERVICE PROVIDERS; 8.3 FINAL REMARKS; References; Chapter 9 Gateway Solutions; 9.1 INTRODUCTION; 9.2 PRODUCTS AND SOLUTIONS; 9.2.1 Totemomail Encryption Gateway; 9.2.2 SEPPmail; 9.3 FINAL REMARKS; Reference; Chapter 10 Certified Mail ; 10.1 INTRODUCTION; 10.2 SOLUTIONS; 10.2.1 Ad Hoc Solutions; 10.2.2 TTP-Based Solutions; 10.3 MESSAGE DELIVERY PLATFORMS.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">10.4 FINAL REMARKSReferences; Chapter 11 Instant Messaging; 11.1 INTRODUCTION; 11.2 IM SECURITY; 11.3 OFF-THE-RECORDMESSAGING; 11.4 FINAL REMARKS; References; Chapter 12 Research Challenges and Open Questions; 12.1 SPAM PROTECTION; 12.2 P2P PRINCIPLES AND TECHNOLOGIES; 12.3 NEW APPROACHES AND ARCHITECTURES; References; Chapter 13 Conclusions and Outlook; Appendix A Character Sets; A.1 ASCII; A.2 ISO/IEC 8859; A.3 UNICODE; A.4 ISO/IEC 10646-1, UCS, AND UTF-8; Reference; Appendix B Transfer Encoding Schemes; B.1 QUOTED-PRINTABLE; B.2 UU; B.3 BASE-64; B.4 RADIX-64; Reference.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book offers a comprehensive understanding of secure Internet messaging, and brings together all the relevant and critical information needed to use OpenPGP and S/MIME-compliant software. It explores the conceptual and technical approaches followed by the developers of both OpenPGP and S/MIME, and gives a thorough treatment of the latest and most-effective technologies for secure messaging. Ideal for security and network managers, as well as professional system and network administrators, this easy-to-understand book is a complete guide to OpenPGP, S/MIME, Web-based and gateway solutions,</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">Text in English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic mail messages</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Courrier électronique</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic mail messages</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Oppliger, Rolf.</subfield><subfield code="t">Secure Messaging on the Internet.</subfield><subfield code="d">Boston : Artech House, [2014]</subfield><subfield code="z">1608077179</subfield><subfield code="z">9781608077175</subfield><subfield code="w">(DLC) 2014469159</subfield><subfield code="w">(OCoLC)876671550</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1155192</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH30683808</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1770468</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1155192</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">IEEE</subfield><subfield code="b">IEEE</subfield><subfield code="n">9100806</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12810340</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">securemessagingo0000oppl</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn935983100 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:27:01Z |
institution | BVB |
isbn | 9781608077182 1608077187 |
language | English |
oclc_num | 935983100 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Artech House, |
record_format | marc |
spelling | Oppliger, Rolf, author. http://id.loc.gov/authorities/names/n96000042 Secure Messaging on the Internet / Rolf Oppliger. Boston : Artech House, [2014] ©2014 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier Secure Messaging on the Internet; Contents; Preface; Acknowledgments; Chapter 1 Introduction; References; Chapter 2 Internet Messaging; 2.1 INTRODUCTION; 2.2 INTERNET MESSAGE FORMAT; 2.2.1 Header Section; 2.2.2 Message Body; 2.2.3 MIME; 2.3 INTERNET MESSAGING PROTOCOLS; 2.3.1 Message Transfer and Delivery; 2.3.2 Message Store Access; 2.3.3 Directory Access; 2.4 FINAL REMARKS; References; Chapter 3 Cryptographic Techniques; 3.1 INTRODUCTION; 3.1.1 Preliminary Remarks; 3.1.2 Cryptographic Systems; 3.1.3 Classes of Cryptographic Systems; 3.1.4 Secure Cryptosystems. 3.1.5 Historical Background Information3.2 CRYPTOSYSTEMS OVERVIEW; 3.2.1 Unkeyed Cryptosystems; 3.2.2 Secret Key Cryptosystems; 3.2.3 Public Key Cryptosystems; 3.3 FINAL REMARKS; References; Chapter 4 Certificate Management; 4.1 INTRODUCTION; 4.2 X.509 CERTIFICATES; 4.2.1 Certificate Format; 4.2.2 Hierarchical Trust Model; 4.3 OpenPGP CERTIFICATES; 4.3.1 Certificate Format; 4.3.2 Cumulative Trust Model; 4.4 FINAL REMARKS; References; Chapter 5 Secure Messaging ; 5.1 THREATS AND ATTACKS; 5.1.1 Passive Attacks; 5.1.2 Active Attacks; 5.2 SECURE MESSAGING. 5.2.1 What Does "Secure Messaging" Mean?5.2.2 How Can "Secure Messaging" Be Implemented?; 5.3 FINAL REMARKS; References; Chapter 6 OpenPGP ; 6.1 ORIGINS AND HISTORY; 6.2 TECHNOLOGY; 6.2.1 Preliminary Remarks; 6.2.2 Key ID; 6.2.3 Message Format; 6.2.4 PGP/MIME; 6.2.5 Supported Algorithms; 6.2.6 Message Processing; 6.2.7 Cryptographic Keys; 6.3 WEB OF TRUST; 6.3.1 Keyrings; 6.3.2 Trust Establishment; 6.3.3 Key Revocation; 6.3.4 Key Servers; 6.4 SECURITY ANALYSIS; 6.4.1 Specification; 6.4.2 Implementations; 6.5 FINAL REMARKS; References; Chapter 7 S/MIME ; 7.1 ORIGINS AND HISTORY; 7.2 TECHNOLOGY. 7.2.1 Message Formats7.2.2 Cryptographic Algorithms; 7.2.3 Attributes; 7.2.4 Enhanced Security Services; 7.3 CERTIFICATES; 7.4 SECURITY ANALYSIS; 7.5 FINAL REMARKS; References; Chapter 8 Web-Based Messaging ; 8.1 INTRODUCTION; 8.2 SERVICE PROVIDERS; 8.3 FINAL REMARKS; References; Chapter 9 Gateway Solutions; 9.1 INTRODUCTION; 9.2 PRODUCTS AND SOLUTIONS; 9.2.1 Totemomail Encryption Gateway; 9.2.2 SEPPmail; 9.3 FINAL REMARKS; Reference; Chapter 10 Certified Mail ; 10.1 INTRODUCTION; 10.2 SOLUTIONS; 10.2.1 Ad Hoc Solutions; 10.2.2 TTP-Based Solutions; 10.3 MESSAGE DELIVERY PLATFORMS. 10.4 FINAL REMARKSReferences; Chapter 11 Instant Messaging; 11.1 INTRODUCTION; 11.2 IM SECURITY; 11.3 OFF-THE-RECORDMESSAGING; 11.4 FINAL REMARKS; References; Chapter 12 Research Challenges and Open Questions; 12.1 SPAM PROTECTION; 12.2 P2P PRINCIPLES AND TECHNOLOGIES; 12.3 NEW APPROACHES AND ARCHITECTURES; References; Chapter 13 Conclusions and Outlook; Appendix A Character Sets; A.1 ASCII; A.2 ISO/IEC 8859; A.3 UNICODE; A.4 ISO/IEC 10646-1, UCS, AND UTF-8; Reference; Appendix B Transfer Encoding Schemes; B.1 QUOTED-PRINTABLE; B.2 UU; B.3 BASE-64; B.4 RADIX-64; Reference. This book offers a comprehensive understanding of secure Internet messaging, and brings together all the relevant and critical information needed to use OpenPGP and S/MIME-compliant software. It explores the conceptual and technical approaches followed by the developers of both OpenPGP and S/MIME, and gives a thorough treatment of the latest and most-effective technologies for secure messaging. Ideal for security and network managers, as well as professional system and network administrators, this easy-to-understand book is a complete guide to OpenPGP, S/MIME, Web-based and gateway solutions, Includes bibliographical references. Text in English. Electronic mail messages Security measures. Courrier électronique Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Electronic mail messages Security measures fast Print version: Oppliger, Rolf. Secure Messaging on the Internet. Boston : Artech House, [2014] 1608077179 9781608077175 (DLC) 2014469159 (OCoLC)876671550 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1155192 Volltext |
spellingShingle | Oppliger, Rolf Secure Messaging on the Internet / Secure Messaging on the Internet; Contents; Preface; Acknowledgments; Chapter 1 Introduction; References; Chapter 2 Internet Messaging; 2.1 INTRODUCTION; 2.2 INTERNET MESSAGE FORMAT; 2.2.1 Header Section; 2.2.2 Message Body; 2.2.3 MIME; 2.3 INTERNET MESSAGING PROTOCOLS; 2.3.1 Message Transfer and Delivery; 2.3.2 Message Store Access; 2.3.3 Directory Access; 2.4 FINAL REMARKS; References; Chapter 3 Cryptographic Techniques; 3.1 INTRODUCTION; 3.1.1 Preliminary Remarks; 3.1.2 Cryptographic Systems; 3.1.3 Classes of Cryptographic Systems; 3.1.4 Secure Cryptosystems. 3.1.5 Historical Background Information3.2 CRYPTOSYSTEMS OVERVIEW; 3.2.1 Unkeyed Cryptosystems; 3.2.2 Secret Key Cryptosystems; 3.2.3 Public Key Cryptosystems; 3.3 FINAL REMARKS; References; Chapter 4 Certificate Management; 4.1 INTRODUCTION; 4.2 X.509 CERTIFICATES; 4.2.1 Certificate Format; 4.2.2 Hierarchical Trust Model; 4.3 OpenPGP CERTIFICATES; 4.3.1 Certificate Format; 4.3.2 Cumulative Trust Model; 4.4 FINAL REMARKS; References; Chapter 5 Secure Messaging ; 5.1 THREATS AND ATTACKS; 5.1.1 Passive Attacks; 5.1.2 Active Attacks; 5.2 SECURE MESSAGING. 5.2.1 What Does "Secure Messaging" Mean?5.2.2 How Can "Secure Messaging" Be Implemented?; 5.3 FINAL REMARKS; References; Chapter 6 OpenPGP ; 6.1 ORIGINS AND HISTORY; 6.2 TECHNOLOGY; 6.2.1 Preliminary Remarks; 6.2.2 Key ID; 6.2.3 Message Format; 6.2.4 PGP/MIME; 6.2.5 Supported Algorithms; 6.2.6 Message Processing; 6.2.7 Cryptographic Keys; 6.3 WEB OF TRUST; 6.3.1 Keyrings; 6.3.2 Trust Establishment; 6.3.3 Key Revocation; 6.3.4 Key Servers; 6.4 SECURITY ANALYSIS; 6.4.1 Specification; 6.4.2 Implementations; 6.5 FINAL REMARKS; References; Chapter 7 S/MIME ; 7.1 ORIGINS AND HISTORY; 7.2 TECHNOLOGY. 7.2.1 Message Formats7.2.2 Cryptographic Algorithms; 7.2.3 Attributes; 7.2.4 Enhanced Security Services; 7.3 CERTIFICATES; 7.4 SECURITY ANALYSIS; 7.5 FINAL REMARKS; References; Chapter 8 Web-Based Messaging ; 8.1 INTRODUCTION; 8.2 SERVICE PROVIDERS; 8.3 FINAL REMARKS; References; Chapter 9 Gateway Solutions; 9.1 INTRODUCTION; 9.2 PRODUCTS AND SOLUTIONS; 9.2.1 Totemomail Encryption Gateway; 9.2.2 SEPPmail; 9.3 FINAL REMARKS; Reference; Chapter 10 Certified Mail ; 10.1 INTRODUCTION; 10.2 SOLUTIONS; 10.2.1 Ad Hoc Solutions; 10.2.2 TTP-Based Solutions; 10.3 MESSAGE DELIVERY PLATFORMS. 10.4 FINAL REMARKSReferences; Chapter 11 Instant Messaging; 11.1 INTRODUCTION; 11.2 IM SECURITY; 11.3 OFF-THE-RECORDMESSAGING; 11.4 FINAL REMARKS; References; Chapter 12 Research Challenges and Open Questions; 12.1 SPAM PROTECTION; 12.2 P2P PRINCIPLES AND TECHNOLOGIES; 12.3 NEW APPROACHES AND ARCHITECTURES; References; Chapter 13 Conclusions and Outlook; Appendix A Character Sets; A.1 ASCII; A.2 ISO/IEC 8859; A.3 UNICODE; A.4 ISO/IEC 10646-1, UCS, AND UTF-8; Reference; Appendix B Transfer Encoding Schemes; B.1 QUOTED-PRINTABLE; B.2 UU; B.3 BASE-64; B.4 RADIX-64; Reference. Electronic mail messages Security measures. Courrier électronique Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Electronic mail messages Security measures fast |
title | Secure Messaging on the Internet / |
title_auth | Secure Messaging on the Internet / |
title_exact_search | Secure Messaging on the Internet / |
title_full | Secure Messaging on the Internet / Rolf Oppliger. |
title_fullStr | Secure Messaging on the Internet / Rolf Oppliger. |
title_full_unstemmed | Secure Messaging on the Internet / Rolf Oppliger. |
title_short | Secure Messaging on the Internet / |
title_sort | secure messaging on the internet |
topic | Electronic mail messages Security measures. Courrier électronique Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Electronic mail messages Security measures fast |
topic_facet | Electronic mail messages Security measures. Courrier électronique Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Electronic mail messages Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1155192 |
work_keys_str_mv | AT oppligerrolf securemessagingontheinternet |