O'Reilly logo

Upgrading and Repairing Networks, Fifth Edition by Mark Edward Soper, Terry W Ogletree

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 47. Encryption Technology

SOME OF THE MAIN TOPICS IN THIS CHAPTER ARE

Computers and Privacy 908

What Is Encryption? 908

Digital Certificates 912

Pretty Good Privacy (PGP) 913

This chapter gives you a quick overview of the two basic encryption techniques in use today, and shows how they can be applied to networks to help keep programs and data secure and to prevent unauthorized persons from gaining access. These encryption techniques are known generally as single-key encryption and public-key encryption. Alternatively, they often are referred to as symmetric encryption (single key) and asymmetric encryption (public key).

Computers and Privacy

When computers were standalone systems that were easily controlled by a central administrative ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required