Linked e-resources
Details
Table of Contents
Network security
Threat analysis
Application security
Cryptographic protocols
Cryptanalysis
Cryptographic implementations
Authentication using bio and ML
Authentication
ICT Convergent security.
Threat analysis
Application security
Cryptographic protocols
Cryptanalysis
Cryptographic implementations
Authentication using bio and ML
Authentication
ICT Convergent security.