Summary
It illustrates the complete techniques for protecting data and accesses and for key management. (T2.*)
More information & hyperlinks