27AC Encryption 101

= Award Winning Session | = AIX | = IBM i | = Linux

Monday, May 7, 2012: 5:00 PM-6:15 PM
Nile (Disneyland Hotel )

Session Abstract:
Protecting your sensitive data is easy - if you know the right steps. This encryption presentation will take you through the four basic steps of any encryption project: data encryption, encryption key management, decryption, and activity logging.
Learning Objectives:

Home Annual Meeting and Exposition

Share |

Copyright © 2010 COMMON, A Users Group.
All Rights Reserved.