User:Gusmolva/Books/2ASIX - Security and High Availability

Security and High Availability

 * Hashing
 * Hash function
 * Cryptographic hash function
 * MD5
 * SHA-1
 * SHA-2
 * SHA-3
 * Secure Shell
 * GNU Privacy Guard


 * Symetric-key Algorithm
 * Symmetric-key algorithm
 * Caesar cipher
 * Polybius square
 * Substitution cipher
 * Transposition cipher
 * Vigenère cipher
 * Twofish
 * Serpent (cipher)
 * Advanced Encryption Standard
 * Blowfish (cipher)
 * CAST-128
 * RC4
 * Triple DES
 * International Data Encryption Algorithm


 * Asymmetric-key algorithm
 * Public-key cryptography
 * Diffie–Hellman key exchange
 * RSA (cryptosystem)
 * Digital Signature Algorithm
 * ElGamal encryption
 * Elliptic curve cryptography
 * Password-authenticated key agreement
 * Cramer–Shoup cryptosystem
 * Paillier cryptosystem
 * Cramer–Shoup cryptosystem
 * YAK (cryptography)
 * Transport Layer Security
 * Bitcoin


 * Redundant Array of Independent Disks
 * RAID
 * Standard RAID levels


 * Logic Volume
 * Logical volume management


 * Clusters
 * Computer cluster
 * Clustered file system
 * Heartbeat network
 * High-availability cluster
 * OpenStack
 * OpenNebula
 * Cloud computing