Get Network Security First-Step now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.
By the end of this chapter, you should know and be able to explain the following:
The difference between DES and 3DES, including their limitations
The function and role of MD5 plays in securing connections
The differences between PPTP and L2TP
The breadth and scope of SSH and how it is more secure ...