January 2020
Intermediate to advanced
268 pages
9h 22m
English
Figure 2.1 The risk management life cycle
Figure 2.2 A typical risk matrix
Figure 4.1 The data and information life cycle
Figure 6.1 The Plan–Do–Check–Act model
Figure 9.1 Symmetric key encryption
Figure 9.2 Asymmetric key encryption
Figure 9.3 Producing a signed message digest
Read now
Unlock full access