No credit card required
After reading this chapter, you should be able to:
Understand the concept of data exhaust and how it can be used by an attacker
Understand the basic operation of encryption systems, including asymmetric and symmetric encryption
Understand the concept of a web of trust
Understand the basic principles ...