Cryptography in Action
You will encounter cryptography in many forms throughout this book. It is applied to many different technologies and situations and, as such, is something you need to have a firm grasp of. Some examples of applied cryptography are: Public key infrastructure (PKI) Digital certificates Authentication E-commerce RSA MD-5 Secure Hash Algorithm (SHA) Secure Sockets Layer … Read more