种子简介
种子名称:
[FreeCoursesOnline.Me] [Packt] Hands-On Cryptography with Java [FCO]
文件类型:
视频
文件数目:
28个文件
文件大小:
745.79 MB
收录时间:
2020-11-29 10:45
已经下载:
3次
资源热度:
271
最近下载:
2025-3-20 10:57
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:4480bb82daa3a2a0b666704515fd8d71965b9442&dn=[FreeCoursesOnline.Me] [Packt] Hands-On Cryptography with Java [FCO]
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
[FreeCoursesOnline.Me] [Packt] Hands-On Cryptography with Java [FCO].torrent
01.Cryptographic Introduction/0101.The Course Overview.mp44.99MB
01.Cryptographic Introduction/0102.Goals of Cryptography and Where It Is Used.mp49.78MB
01.Cryptographic Introduction/0103.History of Cryptography and Why You Shouldn’t Build New Algorithms.mp411MB
01.Cryptographic Introduction/0104.The Architectural Layout of Modern Cryptography.mp410.38MB
01.Cryptographic Introduction/0105.Concepts That Will Be Important Later.mp413.76MB
02.Basic Ciphers/0201.Symmetric Ciphers and Where They Are Used.mp48.3MB
02.Basic Ciphers/0202.Basic Encryption with Symmetric Ciphers.mp419.54MB
02.Basic Ciphers/0203.Hashing and MessageDigest For Validations.mp421.23MB
02.Basic Ciphers/0204.Common Security Flaws When Using Symmetric Ciphers.mp410.55MB
03.Advanced Ciphers, Asymmetric, and Public Key/0301.This section will cover how asymmetric cryptography works...mp437.58MB
03.Advanced Ciphers, Asymmetric, and Public Key/0302.Creating A KeyPairGenerator Instance.mp419.71MB
03.Advanced Ciphers, Asymmetric, and Public Key/0303.Storing the Java KeyStore.mp428.99MB
03.Advanced Ciphers, Asymmetric, and Public Key/0304.Java KeyTool.mp422.18MB
03.Advanced Ciphers, Asymmetric, and Public Key/0305.Creating A KeyGenerator Instance.mp483.12MB
03.Advanced Ciphers, Asymmetric, and Public Key/0306.Basic Encryption with Asymmetric Ciphers.mp428.51MB
03.Advanced Ciphers, Asymmetric, and Public Key/0307.What to Do When PKIX Validation Fails.mp458.86MB
03.Advanced Ciphers, Asymmetric, and Public Key/0308.Java Certificate Chains.mp469.19MB
03.Advanced Ciphers, Asymmetric, and Public Key/0309.The Key Escrow Problem.mp446.1MB
04.Hacking Techniques – Breaking and Bypassing/0401.Using Unique Keys and Certificates.mp412.11MB
04.Hacking Techniques – Breaking and Bypassing/0402.Certificate Pinning.mp436.9MB
04.Hacking Techniques – Breaking and Bypassing/0403.Signed JAR Files.mp428.55MB
04.Hacking Techniques – Breaking and Bypassing/0404.Token Harvesting.mp412.9MB
04.Hacking Techniques – Breaking and Bypassing/0405.When and How to Upgrade Algorithms.mp411.23MB
04.Hacking Techniques – Breaking and Bypassing/0406.Standard Decompilation Tools.mp425.74MB
05.Putting it all together/0501.Encrypting and Decrypting Files.mp423.71MB
05.Putting it all together/0502.Obtaining Certificates from LetsEncrypt or AWS.mp452.51MB
05.Putting it all together/0503.Qualys SSL Labs for Your Servers.mp419.76MB
05.Putting it all together/0504.he DeepViolet Security Analyzer.mp418.61MB