May 2008
Intermediate to advanced
624 pages
16h 23m
English
An algorithm that produces a hash value of some piece of data, such as a message or session key. If you use a well designed hash algorithm, when input data changes are made, the resulting hash value can alter. Hash values are useful in detecting modifications to data. A well-designed hash algorithm makes it almost impossible for two independent inputs that have the same hash value.
A record that is used to statically associate a host's name to its IP addresses. Also called an A record for TCP/IP v4 and AAAA record for TCP/IP v6.
Read now
Unlock full access