Securing Email Communication

How to Protect Your Correspondence from Wiretapping Using Free Tools

Cyber Privacy Series



Slava Gomzin



Cover Photo and Design: Alisa Levy

Smashwords Edition

Copyright © 2012 Slava Gomzin





Table of Contents



Introduction

Part I: The “Theory” of Cryptographic Message Protection

What is Public Key Encryption?

What is Public Key Infrastructure?

What is S/MIME?

Previous Page Next Page Page 1 of 19