First page Back Continue Last page Overview Graphics
Where can you apply these cryptographic methods
- At the link layer
- At the network layer
- At the transport layer
- At the application layer
- SSH
- PGP and GPG
- System integrity checking, package management, etc