security vulnerabilities in networking protocols, the confidentiality, integrity and availability (CIA) triad, basic cryptography concepts, key management, cryptographic protocols and practical ...
It introduces mathematical structures that provide a basis for computer science and cyber security to prepare students with the necessary skills in this domain. You will gain skills to learn the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results