Security-basics
CHAPTER 5 – AUTHENTICATION AND ENCRYPTION TECHNOLOGY
Network security
Cyber security
1 Guide to Network Defense and Countermeasures Chapter 2.