Cryptography in use Chapter 1 : Required Tools Chapter 2 : Encoding Chapter 3 : Secrecy Chapter 4 : Integrity Chapter 5 : Authentication Chapter 6 : Non-Repudiation Chapter 7 : Time Stamp Authority Chapter 8 : Android Security Chapter 9 : iOS Security Chapter 10 : Web Security Chapter 11 : Smart Cards Chapter 12 : HSM vs SSM