Abstract
Secure communication is a concern, particularly when sharing confidential and vital information between people. For example, English Prime Minister Winston Churchill and American President Franklin D. Roosevelt shared critical military information, such as troop movements, during World War II. To secure their voice conversations through the telephone, the SIGSALY (aka Green Hornet) was devised to encrypt and decrypt using cryptographic keys.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Darl Kuhn, Charles Kim, and Bernard Lopuz
About this chapter
Cite this chapter
Kuhn, D., Kim, C., Lopuz, B. (2015). Chapter 14: Working Securely Across a Network. In: Linux and Solaris Recipes for Oracle DBAs. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-1254-7_14
Download citation
DOI: https://doi.org/10.1007/978-1-4842-1254-7_14
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-1255-4
Online ISBN: 978-1-4842-1254-7
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books