Cryptography Best Practices

Provided by: SecurityTube.net Topic: Security Date Added: Mar 2013 Format: Webcast
Application architects need to make informed choices to use cryptography well: alternative key architectures have their merits and drawbacks. PKIs, in particular, should be contrasted with symmetric key architectures such as Kerberos. Network protocol characteristics are pivotal in ensuring distributed applications meet security requirements.

Find By Topic