Conventional and public-key cryptosystems, hash algorithms, digital signature, authentication, identification, access control, distributed system security, network security, web security, Unix security, firewalls, email security, secure shell, virtual private networks.