Section 19.1. Basic data security
Section 19.2. Data protection begins with passwords
Section 19.3. Putting encrypted passwords in databases
Section 19.4. MD and digital signatures
Section 19.5. Data security with public-key technology
Section 19.6. A quick tour of GnuPG