Get full access to Network Security First-Step and 60K+ other titles, with free 10-day trial of O'Reilly.
There's also live online events, interactive content, certification prep materials, and more.
By the end of this chapter, you should know and be able to explain the following:
The difference between DES and 3DES, including their limitations
The function and role of MD5 plays in securing connections
The differences between PPTP and L2TP
The breadth and scope of SSH and how it is more secure ...
Get Network Security First-Step now with the O’Reilly learning platform.
O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.
Get Mark Richards’s Software Architecture Patterns ebook to better understand how to design components—and how they should interact.