O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Introduction

There have been growing concerns over the security of sensitive personal and business data. With the growing abilities of hackers and the proliferation of business networks connected to the Internet, much of your important data can be left exposed to anyone with the skills and motivation to get your data. One practical method of securing this data is the use of cryptography (the concept and study of encryption and decryption) in the form of encryption algorithms applied to data that is passed around networks or even stored on hard drives. Ideally, encryption is used to change regular readable data into unintelligible garble that no one can read without the matching key on the other end to unscramble the data. Although the concept ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required