About the Book
Explains how to implement cryptographic algorithms in today's data protection landscape, covering such topics as how to use ciphers and hashes; generate random keys; handle VPN and Wi-Fi security; and encrypt VoIP, Email, and Web communications.