About Enterprise iPhone Deep Dive

This PDF provides the following benefits:

A walkthrough of the many users of encryption and a glossary of essential terms

A complete discussion of how encryption works, including cipher keys, cryptographic hashes, asymmetric encryption, and more

The ins and outs of public key infrastructure, from key management to revocation management

©1994-2014 Infoworld, Inc.