Monologic (reading, lecture, briefing), Dialogic (discussion, interview, brainstorming)
- Contact teaching
- 15 hours per semester
- Preparation for an exam
- 20 hours per semester
- Preparation for a credit (assessment)
- 15 hours per semester
- Preparation for a partial test
- 10 hours per semester
- Home preparation for classes
- 50 hours per semester
- Independent critical reading
- 40 hours per semester
|
-
FERGUSON,N., SCHNEIER, B.,TADAYOSIHI,K.. Cryptography Engineering: Design Principles and Practical Applications in Engineering Design.. Wiley publishing, 2010. ISBN 978-0-470-47424-2.
-
MENEZES A. J., OORSCHOT P. C., VANSTONE S. A. Handbook of Applied Cryptography. CRC Press, 2001.
-
SCHNEIER,B. Applied cryptography, Protocols, Algoritthms, and Source Codxe in C.. Wiley publishing, 2015. ISBN 1119096723.
-
STALLINGS, W. Cryptography and network security : principles and practice. (7th Edition). Upper Saddle River: Pearson Education, 2016. ISBN 0134444284.
-
ZELENKA J., ČAPEK J., FRANCEK J. Ochrana dat. Kryptologie.. Hradec Králové: Gaudeamus, 2003. ISBN 8070417374.
|