This is an introduction to the SHA Hashing Algorithm. The origins of SHA are explained, along with the family taxonomy of SHA message digest functions. We also cover their uses in cryptography. DOWNLOAD ATTACHMENT Share : November 30, 2016 1137 Information Technology, IS Security, Risk Management Data Center , Data Center Consultant , Data Center Expert , Security Total 0 Votes: 0 0 Tell us how can we improve this post? Captcha: + = Verify Human or Spambot ? Related Knowledge Base Posts -The Laws of Technology : Driving Demand in the Data CenterAvailability- How many 9’s are enough?The MD5 Hashing Algorithm Ask Bob a Question Question Title: Category: – Select KB Category – General Information Technology Big Ideas Energy Efficiency Data Center Design and Operations IS Security, Risk Management Video Library Your Email: You will get a notification email when Knowledgebase answerd/updated! Captcha: + = Verify Human or Spambot ?