The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.
From page 17... ...
Chapter 2 also places cryptography into context, as one element of an overall approach to information security, as a product that responds to factors related to both supply and demand, and as a technology whose large-scale use requires a supporting infrastructure. Chapter 3 discusses public policy issues raised by the need for access to encrypted information.
|
Key Terms
This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More
information on Chapter Skim is available.