![]() |
|
||||||
  |
A free PDF document
Download the free Adobe Acrobat Reader to read the book. If you would rather have a physical book, you can buy it on Amazon. Hash ListYou can verify the integrity of the downloaded document by computing its MD5 and SHA1 hashes. Hash values can be thought of as fingerprints for files. The contents of a file are processed through a cryptographic algorithm, and a unique numerical value, the hash value, is produced. If the contents are modified in any way, the value of the hash will also change. Two algorithms are currently widely used to produce hash values, MD5 and SHA1. Tools for computing hash values of a file are freely available for various operating systems.
|
||||||
|