IT Skills Software Design and Development Python
Walking you through creating secure communications in public channels using public-key cryptography, this easy-to-read guide provides real-world examples to aid in your understanding of the pros and cons of various authentication methods.