Read our cookies policy and privacy statement for more information.
×Highland Heights, Kentucky
Theory and algorithms of computer security, including security policies, access control, secure programming, identity and authentication, information flow, and information assurance techniques
Units: 3.0
Hours: 3 classroom + 0 lab/studio