ENCRYPTION
The following links may be useful all on their own, but are offered primarily as a convenience for readers of the print book Privacy Tactics. These are the links from the chapter Additional Resource sections.
Link Disclaimer: These links are those found in the Additional Resource sections of the Privacy Tactics book. (Possibly with updates where appropriate.) Except where otherwise noted, these links lead off this site. They're here for the convenience of readers. No endorsement is made or should be implied unless explicitly stated. Nor can we accept responsibility for their content. If you find anything that seems overly objectionable, and believe we should not link to their site, let us know and we'll re-examine that site's value to our goals.
Encryption Products
These are just a few vendors in the consumer area for
encryption products. No attempt has been made to collect or categorize
the many vendors in the business to business market.
Baltimore
Enterprise level solutions.
www.baltimore.com
Cryptix
More for the developer.
www.cryptix.org
Pretty Good Privacy
An early leader. Technology for individuals and organizations.
www.pgp.com
RSA Security
www.rsasecurity.com
Steganos
Security Suite 5
www.steganos.com/./en
WinMagic
www.winmagic.com
Overviews
An Introduction to Cryptography from PGP
Well presented beginner through advanced concepts.
www.pgp.com/products/whitepapers/pgp_introtocryptography.pdf
Introduction to Encryption and Public Key Infrastructure
(PKI)
www.itsecurity.com/papers/upaq.htm
SecurityFocus
Introduction to Encryption
www.securityfocus.com/infocus/1181
|