Cybersecurity has become a popular topic of interest. Most recent and widely known examples of security problems include password leakage on popular online social networks and the compromise of personal data from medical and airline sectors. Fortunately, nowadays companies, organizations, and academic institutions have put in a lot of effort to protect their assets from threats and attacks. The intent in this chapter is to provide an overview of cryptography, which is considered the foundation ...
1. Introduction to Cryptography
Get Authentication and Access Control: Practical Cryptography Methods and Tools now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.