Throughout this chapter, you learned about the fundamentals of encryption, including encryption algorithms and the ways in which many of them function. It is important to remember these fundamentals of encryption and how they can be applied to your environments to provide more effective security.
Elliptic Curve Cryptography (ECC)
Encrypting File System (EFS)
Extensible Markup Language (XML)
Public Key Infrastructure (PKI)
Wired Equivalent Privacy (WEP)
XML Access ...