Pittsburgh Technical Council

Safety4Data Publishes Comprehensive Suite of Cybersecurity Articles

Safety4Data Publishes Comprehensive Suite of Cybersecurity Articles

Article Published: November 15, 2016

Safety4dataSafety4Data has compiled an extensive list of thought leadership articles on the latest trends in cybersecurity. Readers don't have to be techies either to get a wealth of information from these posts. So dig in and learn about the latest in cybersecurity.

1. ENCODING: HISTORY, MYTHS, AND FACTS - http://blog.safety4data.com/2015/10/06/encoding-history-myths-and-facts/

 

2. CRYPTOGRAPHY, CRYPTOLOGY, AND STEGANOGRAPHY – TERM DEFINITION - http://blog.safety4data.com/2015/10/08/cryptography-cryptology-and-steganography-term-definition/

 

3. ENCODING MACHINES, ENIGMA, MATHEMATICS - http://blog.safety4data.com/2015/10/12/encoding-machines-enigma-mathematics/

 

4. SECURITY THROUGH OBSCURITY VS. PUBLIC ALGORITHMS - http://blog.safety4data.com/2015/10/13/security-through-obscurity-vs-public-algorithms/

 

5. SYMMETRIC AND ASYMMETRIC CIPHERS (DIFFIE-HELLMAN KEY EXCHANGE) - http://blog.safety4data.com/2015/10/15/symmetric-and-asymmetric-ciphers-diffie-hellman-key-exchange/

 

6. KEY MANAGEMENT: TYPES AND THE BROKEN ENIGMA CIPHER CASE - http://blog.safety4data.com/2015/11/24/key-management-types-and-the-broken-enigma-cipher-case/

 

7. SECURITY LEVEL - http://blog.safety4data.com/2015/12/01/security-level/

 

8. LONG-TERM ARCHIVING PROBLEMS - http://blog.safety4data.com/2015/12/22/long-term-archiving-problems/

 

9. ONE-TIME PAD – THE PRINCIPLE AND HISTORY OF ORIGIN - http://blog.safety4data.com/2016/01/21/one-time-pad-the-principle-and-history-of-origin/

 

10. ONE-TIME PAD – THE KEY MANAGEMENT - http://blog.safety4data.com/2016/01/21/one-time-pad-the-key-management/

Other Articles That May Interest You:

Sign In or Join Up