zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
[Pluralsight] Cryptography Fundamentals for Java and .NET Developers
magnet:?xt=urn:btih:ae2d3688fa28d54cae5e25017567c5070dcd9394&dn=[Pluralsight] Cryptography Fundamentals for Java and .NET Developers
磁力链接详情
文件列表详情
ae2d3688fa28d54cae5e25017567c5070dcd9394
infohash:
76
文件数量
548.29 MB
文件大小
2016-11-21 14:44
创建日期
2024-11-9 09:53
最后访问
相关分词
Pluralsight
Cryptography
Fundamentals
for
Java
and
NET
Developers
01. History of Cryptography/01_01-Introduction.mp4 10.61 MB
01. History of Cryptography/01_02-One-Time Pads.mp4 6.45 MB
01. History of Cryptography/01_03-Entropy.mp4 8.43 MB
01. History of Cryptography/01_04-The Enigma Machine.mp4 11.9 MB
01. History of Cryptography/01_05-Cryptanalysis.mp4 10.35 MB
01. History of Cryptography/01_06-Diffie-Hellman.mp4 15.4 MB
01. History of Cryptography/01_07-Diffie-Hellman Example.mp4 11.12 MB
01. History of Cryptography/01_08-Conclusion.mp4 2.32 MB
02. Algorithms/02_01-Introduction.mp4 1.06 MB
02. Algorithms/02_02-Block Ciphers.mp4 3.06 MB
02. Algorithms/02_03-Confusion and Key Schedules.mp4 1.94 MB
02. Algorithms/02_04-Diffusion and Cipher Block Chaining.mp4 3.48 MB
02. Algorithms/02_05-Initialization Vectors.mp4 1.4 MB
02. Algorithms/02_06-DES.mp4 1.9 MB
02. Algorithms/02_07-AES.mp4 5.13 MB
02. Algorithms/02_08-Modern Cryptanalysis.mp4 2.95 MB
02. Algorithms/02_09-Compression and Error Correction.mp4 6.05 MB
02. Algorithms/02_10-Public and Private Keys.mp4 4.48 MB
02. Algorithms/02_11-Inverse Exponents Example.mp4 7.18 MB
02. Algorithms/02_12-Finding Inverse Exponents.mp4 5.68 MB
02. Algorithms/02_13-The RSA Algorithm.mp4 3.7 MB
02. Algorithms/02_14-Patterns in RSA.mp4 7.59 MB
02. Algorithms/02_15-Elliptic Curve.mp4 5.34 MB
02. Algorithms/02_16-Digital Signatures.mp4 4.15 MB
02. Algorithms/02_17-Hashing Algorithms.mp4 4.78 MB
02. Algorithms/02_18-Birthday Attack.mp4 7.48 MB
02. Algorithms/02_19-Trust.mp4 3.15 MB
02. Algorithms/02_20-Summary.mp4 1.8 MB
03. APIs/03_01-Symmetric Java APIs.mp4 4.89 MB
03. APIs/03_02-AES in Java.mp4 31.71 MB
03. APIs/03_03-Asymmetric Java APIs.mp4 2.85 MB
03. APIs/03_04-RSA in Java.mp4 28.37 MB
03. APIs/03_05-Bouncy Castle for Java.mp4 6.35 MB
03. APIs/03_06-.NET Crypto API.mp4 1.66 MB
03. APIs/03_07-AES in .NET.mp4 29.68 MB
03. APIs/03_08-RSA in .NET.mp4 38.2 MB
03. APIs/03_09-Summary.mp4 1.74 MB
04. Transport Layer Security/04_01-X.509 Certificates.mp4 13.14 MB
04. Transport Layer Security/04_02-RSA Key Pair.mp4 7.37 MB
04. Transport Layer Security/04_03-Certificate Signing Request.mp4 11.96 MB
04. Transport Layer Security/04_04-Personal Information Exchange.mp4 17.59 MB
04. Transport Layer Security/04_05-IIS.mp4 9.77 MB
04. Transport Layer Security/04_06-Tomcat.mp4 4.54 MB
04. Transport Layer Security/04_07-Naked Keys.mp4 1.29 MB
04. Transport Layer Security/04_08-Apache.mp4 4.59 MB
04. Transport Layer Security/04_09-Summary.mp4 1.24 MB
05. Authentication and Authorization/05_01-Passwords.mp4 3.72 MB
05. Authentication and Authorization/05_02-Hashed Passwords.mp4 3.74 MB
05. Authentication and Authorization/05_03-Rainbow Tables.mp4 6.06 MB
05. Authentication and Authorization/05_04-Salted Hashed Passwords.mp4 2.93 MB
05. Authentication and Authorization/05_05-Computing Password Entropy.mp4 6.3 MB
05. Authentication and Authorization/05_06-Password Based Key Derivation Functions.mp4 7.21 MB
05. Authentication and Authorization/05_07-Progressive Salted Hashed Passwords.mp4 4 MB
05. Authentication and Authorization/05_08-Federation.mp4 6.49 MB
05. Authentication and Authorization/05_09-Kerberos.mp4 2.01 MB
05. Authentication and Authorization/05_10-WS-Trust and WS-Federation.mp4 4.41 MB
05. Authentication and Authorization/05_11-XML Signature Wrapping Attacks.mp4 3.53 MB
05. Authentication and Authorization/05_12-OAuth.mp4 9.86 MB
05. Authentication and Authorization/05_13-OpenID Connect.mp4 4.14 MB
05. Authentication and Authorization/05_14-Conclusion.mp4 1.72 MB
06. Case Studies/06_01-Snapchat.mp4 8.32 MB
06. Case Studies/06_02-Safari.mp4 6.03 MB
06. Case Studies/06_03-Heartbleed.mp4 9.68 MB
06. Case Studies/06_04-Target.mp4 12.75 MB
06. Case Studies/06_05-NSA.mp4 8.71 MB
06. Case Studies/06_06-Lessons Learned.mp4 1.76 MB
07. Decentralized Systems/07_01-PGP.mp4 4.98 MB
07. Decentralized Systems/07_02-Establishing Trust.mp4 7.7 MB
07. Decentralized Systems/07_03-Hashcash.mp4 4.65 MB
07. Decentralized Systems/07_04-Bitcoin.mp4 5.99 MB
07. Decentralized Systems/07_05-Proof of Work.mp4 4.71 MB
07. Decentralized Systems/07_06-Conflict Resolution.mp4 5.8 MB
07. Decentralized Systems/07_07-Mining.mp4 4.06 MB
07. Decentralized Systems/07_08-Freenet.mp4 6.79 MB
07. Decentralized Systems/07_09-Untrusted Networks.mp4 9.9 MB
07. Decentralized Systems/07_10-Conclusion.mp4 4.53 MB
其他位置