{"id":31211,"date":"2017-01-28T08:44:10","date_gmt":"2017-01-28T13:44:10","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/cryptography-for-network-and-information-security.php"},"modified":"2017-01-28T08:44:10","modified_gmt":"2017-01-28T13:44:10","slug":"cryptography-for-network-and-information-security","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/cryptography-for-network-and-information-security.php","title":{"rendered":"Cryptography for Network and Information Security"},"content":{"rendered":"<p><p>    Cryptography is a cornerstone of the modern electronic security    technologies used today to protect valuable information    resources on intranets, extranets, and the Internet. Microsoft    Windows2000 includes a wide range of distributed    security technologies that you can deploy to provide    cryptography-based network and information security.    Understanding the basic concepts, components, and risks of    cryptography-based security is important in choosing and    planning appropriate network and information security systems    for your organization.  <\/p>\n<p>    What    Is Cryptography?  <\/p>\n<p>    Basic    Components of Modern Cryptography  <\/p>\n<p>    Basic    Components of a Public Key Infrastructure  <\/p>\n<p>    Risk    Factors for Cryptography Systems  <\/p>\n<p>    Cryptography    Export Restrictions  <\/p>\n<p>        For information about security solutions that use public        key technology, see         \"Choosing Security Solutions That Use Public Key        Technology\" in this book.      <\/p>\n<p>        For more information about the Windows2000 public key        infrastructure and Certificate Services, see         \"Windows2000 Certificate Services and Public Key        Infrastructure\" in this book.      <\/p>\n<p>        For more information about designing, testing, and        deploying a public key infrastructure, see \"Planning Your        Public Key Infrastructure\" in the Microsoft         Windows  2000 Server Resource Kit        Deployment Planning Guide .      <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/technet.microsoft.com\/en-us\/library\/cc962027.aspx\" title=\"Cryptography for Network and Information Security\">Cryptography for Network and Information Security<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Cryptography is a cornerstone of the modern electronic security technologies used today to protect valuable information resources on intranets, extranets, and the Internet. Microsoft Windows2000 includes a wide range of distributed security technologies that you can deploy to provide cryptography-based network and information security. Understanding the basic concepts, components, and risks of cryptography-based security is important in choosing and planning appropriate network and information security systems for your organization. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-31211","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31211"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31211"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31211\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}