Taking a hard-line approach to encryption /

Hardware-based encryption differs from the traditional approach to encrypting data on hard drives, in which computer CPUs run cryptographic software. The hardware-based technique offers several advantages, including faster performance and less strain on a host system's processing resources. How...

Descripción completa

Detalles Bibliográficos
Autor principal: 104569 Laird, Cameron
Formato: Otro (Other)
Idioma:Español (Spanish)
Materias:
_version_ 1775173608304279552
author 104569 Laird, Cameron
author_facet 104569 Laird, Cameron
author_sort 104569 Laird, Cameron
collection Catálogo
coutry_str Colombia
description Hardware-based encryption differs from the traditional approach to encrypting data on hard drives, in which computer CPUs run cryptographic software. The hardware-based technique offers several advantages, including faster performance and less strain on a host system's processing resources. However, the approach also has disadvantages, such as additional cost and the inability to patch or upgrade products
first_indexed 2023-05-12T18:46:21Z
format Otro (Other)
id KOHA-UCATOLICA:12767
institution Universidad Católica de Colombia
language Español (Spanish)
last_indexed 2023-08-08T07:52:58Z
record_format koha
spelling KOHA-UCATOLICA:127672023-08-01T22:23:36ZTaking a hard-line approach to encryption / 104569 Laird, Cameron textospaHardware-based encryption differs from the traditional approach to encrypting data on hard drives, in which computer CPUs run cryptographic software. The hardware-based technique offers several advantages, including faster performance and less strain on a host system's processing resources. However, the approach also has disadvantages, such as additional cost and the inability to patch or upgrade productsHardware-based encryption differs from the traditional approach to encrypting data on hard drives, in which computer CPUs run cryptographic software. The hardware-based technique offers several advantages, including faster performance and less strain on a host system's processing resources. However, the approach also has disadvantages, such as additional cost and the inability to patch or upgrade productsPROTECCION DE DATOSIEEE ComputerElectrónica y TelecomunicacionesSistemas
spellingShingle PROTECCION DE DATOS
104569 Laird, Cameron
Taking a hard-line approach to encryption /
title Taking a hard-line approach to encryption /
title_full Taking a hard-line approach to encryption /
title_fullStr Taking a hard-line approach to encryption /
title_full_unstemmed Taking a hard-line approach to encryption /
title_short Taking a hard-line approach to encryption /
title_sort taking a hard-line approach to encryption /
topic PROTECCION DE DATOS
work_keys_str_mv AT 104569lairdcameron takingahardlineapproachtoencryption