Red Hat Enterprise Linux 3: Red Hat Enterprise Linux Step By Step Guide | ||
---|---|---|
Prev | Appendix B. Getting Started with Gnu Privacy Guard | Next |
There is more to encryption technology than can be covered in one slim introduction to GnuPG. Here are some resources where you can learn more.
http://www.gnupg.org — The GnuPG website with links to the latest GnuPG releases, a comprehensive user's guide, and other cryptography resources.
http://hotwired.lycos.com/webmonkey/backend/security/tutorials/tutorial1.html — Visit the Encryption Tutorial from Webmonkey to learn more about encryption and how to apply encryption techniques.
http://www.eff.org/pub/Privacy — The Electronic Frontier Foundation, "Privacy, Security, Crypto, & Surveillance" Archive.