Hacking the Code ASP.NET Web Application Security [Electronic resources]

James C. Foster, Mark M. Burnett

نسخه متنی -صفحه : 96/ 79
نمايش فراداده

Index

K

keys

in asymmetric cryptography, 177–178

defined, 154

establishing, 170–173

exchanging, 170

producing from passwords, 204

in symmetric cryptography, 177

keyspace, defined, 155

known-bad data, 286