Every networked application has to deal with security threats, and the code in your application might not always be able to deal with them: someone running off with hardware, a malicious DBA, or a zero-day exploit, for example. Cryptography helps in these situations, and is frequently required in a compliance audit too. Protect your data with exciting acronyms such as HTTPS, GPG, AES, RSA, ECC, DSA, and more; learn about the quick and easy ways to get it right, the difficult ways to get it wrong, and the fantastically difficult ways to get it right that particularly esoteric situations will demand.