CHAPTER 9
Applied Cryptography
We’ll Cover
image   How is cryptography applied?
image   Exploring Secure Sockets Layer (SSL)
image   Encryption and automated teller machines (ATM)
image   Working with digital signatures
image   Drive encryption
Up to this point in the text, we ...

Get Cryptography InfoSec Pro Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.