Securing Email Communication

How to Protect Your Correspondence from Wiretapping Using Free Tools

Cyber Privacy Series

Slava Gomzin

Cover Photo and Design: Alisa Levy

Smashwords Edition

Copyright © 2012 Slava Gomzin

Table of Contents


Part I: The “Theory” of Cryptographic Message Protection

What is Public Key Encryption?

What is Public Key Infrastructure?

What is S/MIME?

Previous Page Next Page Page 1 of 19