O'Reilly logo

Solaris 8 Security by Edgar Danielyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Security and Cryptography

COMPUTER SECURITY IN GENERAL, AND NETWORK security in particular, as we know them today cannot exist without cryptography. Almost all security technologies depend on the science of cryptography in one way or another—be it for encryption of passwords, authentication of users, or digital certificates for servers. It is difficult to overestimate the importance of cryptography in computer security. However, it is easy to incorrectly assume that if you use cryptography (in any form and for any purpose), you are safe and your systems are secure.

This is far from true. Cryptography is just a technology in the process ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required