< Previous | Contents | Next >

3.3 Protecting Objects


 

3.3.1 Authenticity and Checksums3.3.2 Reliability