Interested in solving codes? Or are you already studying Cryptography? Learn how to convert ordinary plain text into coded or unintelligible text & vice-versa.
06. CISM - Chapter 6 - Information Security Program Management
By: C MC
01. Information Security Control Design and Selection (240), 02. Information Security Control Implementation and Integrations (265), 03. Cryptography (299)...
Chapter 1 - The Foundations: Logic and Proofs, Chapter 2 - Basic Structures: Sets, Functions, Sequences, Sums, and Matrices, Chapter 4 - Number Theory and Cryptography