6.1 Basic concepts of cryptography, 6.2 Cryptography algorithms and their basic characteristics, 6.3 Install and configure wireless security settings...
Security Governance Through Principles and Policies, Chapter 2 Personnel Security and Risk Management Concepts, Chapter 3 Business Continuity Planning...