Upgrading and Repairing Networks (5th Edition)
| SOME OF THE MAIN TOPICS IN THIS CHAPTER ARE Computers and Privacy 908 What Is Encryption? 908 Digital Certificates 912 Pretty Good Privacy (PGP) 913 This chapter gives you a quick overview of the two basic encryption techniques in use today, and shows how they can be applied to networks to help keep programs and data secure and to prevent unauthorized persons from gaining access. These encryption techniques are known generally as single-key encryption and public-key encryption. Alternatively, they often are referred to as symmetric encryption (single key) and asymmetric encryption (public key). |
Категории