Previous section
Pertemuan 12 : Cryptography-Public Encryption
Next section
Pertemuan 14 : Laws and Ethic Information security II