Search icon
Subscription
0
Cart icon
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Becoming a Salesforce Certified Technical Architect

You're reading from  Becoming a Salesforce Certified Technical Architect

Product type Book
Published in Feb 2021
Publisher Packt
ISBN-13 9781800568754
Pages 628 pages
Edition 1st Edition
Languages
Author (1):
Tameem Bahri Tameem Bahri
Profile icon Tameem Bahri

Table of Contents (21) Chapters

Preface 1. Section 1: Your Journey to Becoming a CTA
2. Chapter 1: Starting Your Journey as a CTA 3. Chapter 2: Core Architectural Concepts – Data 4. Chapter 3: Core Architectural Concepts – Integration and Cryptography 5. Chapter 4: Core Architectural Concepts – Identity and Access Management 6. Section 2: Knowledge Domains Deep Dive
7. Chapter 5: Developing a Scalable System Architecture 8. Chapter 6: Formulating a Secure Architecture in Salesforce 9. Chapter 7: Designing a Scalable Salesforce Data Architecture 10. Chapter 8: Creating a Lean Solution Architecture 11. Chapter 9: Forging an Integrated Solution 12. Chapter 10: Development Life Cycle and Deployment Planning 13. Chapter 11: Communicating and Socializing Your Solution 14. Section 3: Putting It All Together
15. Chapter 12: Practice the Review Board – First Mock 16. Chapter 13: Present and Defend – First Mock 17. Chapter 14: Practice the Review Board – Second Mock 18. Chapter 15: Present and Defend – Second Mock 19. Other Books You May Enjoy Appendix: Tips and Tricks, and the Way Forward

Cryptographic algorithm types and use cases

The two types of cryptography algorithms that we will dive into are symmetric cryptography algorithms and asymmetric encryption algorithms. We will also dig into the details of hashing algorithms, digital signatures, and message authentication codes (MACs).

Symmetric cryptography algorithms

This is the family of algorithms that relies on a symmetric key for both encrypting the plaintext and decrypting ciphertext. As we discussed earlier, storing the key in a secure and safe way is absolutely crucial for this type of algorithm. The need for sharing the key between both parties (sender and recipient) is one of the main drawbacks of these types of algorithms as the attacker could intercept the used channel and get access to the key. There have been several workarounds during history (remember, some of these algorithms have been around for many years). More streamlined approaches have been adopted in the digital world, and we will find...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}