zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Lynda - Learning Cryptography and Network Security
magnet:?xt=urn:btih:c23a8fe84a5dc46deaf45e9c639adb9e7d5435f7&dn=Lynda - Learning Cryptography and Network Security
磁力链接详情
文件列表详情
c23a8fe84a5dc46deaf45e9c639adb9e7d5435f7
infohash:
35
文件数量
457.17 MB
文件大小
2017-8-11 05:53
创建日期
2024-11-9 22:20
最后访问
相关分词
Lynda
-
Learning
Cryptography
and
Network
Security
00. Introduction/00_01 - Welcome.mp4 24.25 MB
00. Introduction/00_02 - What you should know before watching this course.mp4 1.72 MB
00. Introduction/00_03 - Using the exercise files.mp4 473.73 KB
00. Introduction/00_04 - Challenges explained.mp4 3.15 MB
01. Network Security/01_01 - Understanding why encryption is necessary.mp4 7.98 MB
01. Network Security/01_02 - Providing confidentiality, integrity authentication, and non-repudiation.mp4 8.34 MB
01. Network Security/01_03 - Comparing passive and active network attacks.mp4 18.31 MB
01. Network Security/01_04 - Introducing common cryptographic concepts and terminology.mp4 11.59 MB
01. Network Security/01_05 - Reviewing the history of cryptography.mp4 12.89 MB
01. Network Security/01_06 - Challenge Coding with the Enigma machine.mp4 3.79 MB
01. Network Security/01_07 - Solution Coding with the Enigma machine.mp4 1.33 MB
02. Symmetric Encryption/02_01 - Introducing symmetric encryption.mp4 74.09 MB
02. Symmetric Encryption/02_02 - Making sense of the Feistel cipher.mp4 10.42 MB
02. Symmetric Encryption/02_03 - Working with the Advanced Encryption Standard (AES).mp4 11.08 MB
02. Symmetric Encryption/02_04 - Dissecting block and stream ciphers.mp4 11.1 MB
02. Symmetric Encryption/02_05 - Using Wireshark to crack WEP.mp4 14.84 MB
03. Asymmetric Encryption and Digital Signatures/03_01 - Overview and cryptographic requirements.mp4 59.73 MB
03. Asymmetric Encryption and Digital Signatures/03_02 - Dissecting the public key algorithms RSA and Diffie-Hellman.mp4 9.13 MB
03. Asymmetric Encryption and Digital Signatures/03_03 - Creating key pairs for the Diffie-Hellman algorithm.mp4 6 MB
03. Asymmetric Encryption and Digital Signatures/03_04 - Managing keys.mp4 9.32 MB
03. Asymmetric Encryption and Digital Signatures/03_05 - Using certificates.mp4 8.66 MB
04. Hash Algorithms, Message Digests, and Authentication/04_01 - Diving into hash algorithms and message digests.mp4 12.04 MB
04. Hash Algorithms, Message Digests, and Authentication/04_02 - Looking deeper into message digests.mp4 9.32 MB
04. Hash Algorithms, Message Digests, and Authentication/04_03 - Understanding passwords, hash, salt, and rainbow tables.mp4 32.66 MB
04. Hash Algorithms, Message Digests, and Authentication/04_04 - Challenge Password strength tests.mp4 1.79 MB
04. Hash Algorithms, Message Digests, and Authentication/04_05 - Solution Password strength tests.mp4 10.02 MB
05. Secure Sockets Layer (SSL)/05_01 - Introducing Secure Sockets Layer (SSL).mp4 12.54 MB
05. Secure Sockets Layer (SSL)/05_02 - Exploring the security of SSL with Wireshark.mp4 17.17 MB
06. Email Security/06_01 - Investigating email privacy and authentication concerns.mp4 6.73 MB
06. Email Security/06_02 - Implementing PGP email security with GPG.mp4 8.46 MB
07. Internet Protocol Security/07_01 - Exploring Internet Protocol Security (IPsec).mp4 11.17 MB
07. Internet Protocol Security/07_02 - Dissecting the authentication header.mp4 9.8 MB
07. Internet Protocol Security/07_03 - Encapsulating security payloads.mp4 6.09 MB
07. Internet Protocol Security/07_04 - Using operating mechanisms.mp4 8.03 MB
07. Internet Protocol Security/08_01 - Next steps.mp4 3.15 MB
其他位置