本站已收录 番号和无损神作磁力链接/BT种子 

[Pluralsight] Cryptography Fundamentals for Java and .NET Developers

种子简介

种子名称: [Pluralsight] Cryptography Fundamentals for Java and .NET Developers
文件类型: 视频
文件数目: 76个文件
文件大小: 548.29 MB
收录时间: 2016-11-21 14:44
已经下载: 3
资源热度: 152
最近下载: 2024-12-22 17:04

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:ae2d3688fa28d54cae5e25017567c5070dcd9394&dn=[Pluralsight] Cryptography Fundamentals for Java and .NET Developers 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

[Pluralsight] Cryptography Fundamentals for Java and .NET Developers.torrent
  • 01. History of Cryptography/01_01-Introduction.mp410.61MB
  • 01. History of Cryptography/01_02-One-Time Pads.mp46.45MB
  • 01. History of Cryptography/01_03-Entropy.mp48.43MB
  • 01. History of Cryptography/01_04-The Enigma Machine.mp411.9MB
  • 01. History of Cryptography/01_05-Cryptanalysis.mp410.35MB
  • 01. History of Cryptography/01_06-Diffie-Hellman.mp415.4MB
  • 01. History of Cryptography/01_07-Diffie-Hellman Example.mp411.12MB
  • 01. History of Cryptography/01_08-Conclusion.mp42.32MB
  • 02. Algorithms/02_01-Introduction.mp41.06MB
  • 02. Algorithms/02_02-Block Ciphers.mp43.06MB
  • 02. Algorithms/02_03-Confusion and Key Schedules.mp41.94MB
  • 02. Algorithms/02_04-Diffusion and Cipher Block Chaining.mp43.48MB
  • 02. Algorithms/02_05-Initialization Vectors.mp41.4MB
  • 02. Algorithms/02_06-DES.mp41.9MB
  • 02. Algorithms/02_07-AES.mp45.13MB
  • 02. Algorithms/02_08-Modern Cryptanalysis.mp42.95MB
  • 02. Algorithms/02_09-Compression and Error Correction.mp46.05MB
  • 02. Algorithms/02_10-Public and Private Keys.mp44.48MB
  • 02. Algorithms/02_11-Inverse Exponents Example.mp47.18MB
  • 02. Algorithms/02_12-Finding Inverse Exponents.mp45.68MB
  • 02. Algorithms/02_13-The RSA Algorithm.mp43.7MB
  • 02. Algorithms/02_14-Patterns in RSA.mp47.59MB
  • 02. Algorithms/02_15-Elliptic Curve.mp45.34MB
  • 02. Algorithms/02_16-Digital Signatures.mp44.15MB
  • 02. Algorithms/02_17-Hashing Algorithms.mp44.78MB
  • 02. Algorithms/02_18-Birthday Attack.mp47.48MB
  • 02. Algorithms/02_19-Trust.mp43.15MB
  • 02. Algorithms/02_20-Summary.mp41.8MB
  • 03. APIs/03_01-Symmetric Java APIs.mp44.89MB
  • 03. APIs/03_02-AES in Java.mp431.71MB
  • 03. APIs/03_03-Asymmetric Java APIs.mp42.85MB
  • 03. APIs/03_04-RSA in Java.mp428.37MB
  • 03. APIs/03_05-Bouncy Castle for Java.mp46.35MB
  • 03. APIs/03_06-.NET Crypto API.mp41.66MB
  • 03. APIs/03_07-AES in .NET.mp429.68MB
  • 03. APIs/03_08-RSA in .NET.mp438.2MB
  • 03. APIs/03_09-Summary.mp41.74MB
  • 04. Transport Layer Security/04_01-X.509 Certificates.mp413.14MB
  • 04. Transport Layer Security/04_02-RSA Key Pair.mp47.37MB
  • 04. Transport Layer Security/04_03-Certificate Signing Request.mp411.96MB
  • 04. Transport Layer Security/04_04-Personal Information Exchange.mp417.59MB
  • 04. Transport Layer Security/04_05-IIS.mp49.77MB
  • 04. Transport Layer Security/04_06-Tomcat.mp44.54MB
  • 04. Transport Layer Security/04_07-Naked Keys.mp41.29MB
  • 04. Transport Layer Security/04_08-Apache.mp44.59MB
  • 04. Transport Layer Security/04_09-Summary.mp41.24MB
  • 05. Authentication and Authorization/05_01-Passwords.mp43.72MB
  • 05. Authentication and Authorization/05_02-Hashed Passwords.mp43.74MB
  • 05. Authentication and Authorization/05_03-Rainbow Tables.mp46.06MB
  • 05. Authentication and Authorization/05_04-Salted Hashed Passwords.mp42.93MB
  • 05. Authentication and Authorization/05_05-Computing Password Entropy.mp46.3MB
  • 05. Authentication and Authorization/05_06-Password Based Key Derivation Functions.mp47.21MB
  • 05. Authentication and Authorization/05_07-Progressive Salted Hashed Passwords.mp44MB
  • 05. Authentication and Authorization/05_08-Federation.mp46.49MB
  • 05. Authentication and Authorization/05_09-Kerberos.mp42.01MB
  • 05. Authentication and Authorization/05_10-WS-Trust and WS-Federation.mp44.41MB
  • 05. Authentication and Authorization/05_11-XML Signature Wrapping Attacks.mp43.53MB
  • 05. Authentication and Authorization/05_12-OAuth.mp49.86MB
  • 05. Authentication and Authorization/05_13-OpenID Connect.mp44.14MB
  • 05. Authentication and Authorization/05_14-Conclusion.mp41.72MB
  • 06. Case Studies/06_01-Snapchat.mp48.32MB
  • 06. Case Studies/06_02-Safari.mp46.03MB
  • 06. Case Studies/06_03-Heartbleed.mp49.68MB
  • 06. Case Studies/06_04-Target.mp412.75MB
  • 06. Case Studies/06_05-NSA.mp48.71MB
  • 06. Case Studies/06_06-Lessons Learned.mp41.76MB
  • 07. Decentralized Systems/07_01-PGP.mp44.98MB
  • 07. Decentralized Systems/07_02-Establishing Trust.mp47.7MB
  • 07. Decentralized Systems/07_03-Hashcash.mp44.65MB
  • 07. Decentralized Systems/07_04-Bitcoin.mp45.99MB
  • 07. Decentralized Systems/07_05-Proof of Work.mp44.71MB
  • 07. Decentralized Systems/07_06-Conflict Resolution.mp45.8MB
  • 07. Decentralized Systems/07_07-Mining.mp44.06MB
  • 07. Decentralized Systems/07_08-Freenet.mp46.79MB
  • 07. Decentralized Systems/07_09-Untrusted Networks.mp49.9MB
  • 07. Decentralized Systems/07_10-Conclusion.mp44.53MB