O'Reilly logo

Security for Microsoft Windows System Administrators by Derrick Rountree

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

2 Cryptography

Originally, cryptography was simply considered the process of hiding information. Nowadays, cryptography is used for much more than that. Cryptography is used for authentication, integrity, and confidentiality. One of the most common ways of implementing cryptography involves the implementation of a Public Key Infrastructure (PKI). A Public Key Infrastructure defines the processes and technologies used to implement a cryptography system. In this chapter, we'll start by discussing the key concepts needed to gain an understanding of cryptography and PKI. Then, we'll get into implementing a Public Key Infrastructure ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required