Network Security Fundamentals [Electronic resources]

Gert De Laet, Gert Schauwers

نسخه متنی -صفحه : 196/ 44
نمايش فراداده

Conclusion

This chapter briefly described the different methods that are available for encryption and decryption. It is important that you understand this chapter very well because its topics are the building blocks for the remaining chapters of this book.