种子简介
种子名称:
[Pluralsight] Cryptography Fundamentals for Java and .NET Developers
文件类型:
视频
文件数目:
76个文件
文件大小:
548.29 MB
收录时间:
2016-11-21 14:44
已经下载:
3次
资源热度:
144
最近下载:
2024-10-30 04:38
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:ae2d3688fa28d54cae5e25017567c5070dcd9394&dn=[Pluralsight] Cryptography Fundamentals for Java and .NET Developers
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
[Pluralsight] Cryptography Fundamentals for Java and .NET Developers.torrent
01. History of Cryptography/01_01-Introduction.mp410.61MB
01. History of Cryptography/01_02-One-Time Pads.mp46.45MB
01. History of Cryptography/01_03-Entropy.mp48.43MB
01. History of Cryptography/01_04-The Enigma Machine.mp411.9MB
01. History of Cryptography/01_05-Cryptanalysis.mp410.35MB
01. History of Cryptography/01_06-Diffie-Hellman.mp415.4MB
01. History of Cryptography/01_07-Diffie-Hellman Example.mp411.12MB
01. History of Cryptography/01_08-Conclusion.mp42.32MB
02. Algorithms/02_01-Introduction.mp41.06MB
02. Algorithms/02_02-Block Ciphers.mp43.06MB
02. Algorithms/02_03-Confusion and Key Schedules.mp41.94MB
02. Algorithms/02_04-Diffusion and Cipher Block Chaining.mp43.48MB
02. Algorithms/02_05-Initialization Vectors.mp41.4MB
02. Algorithms/02_06-DES.mp41.9MB
02. Algorithms/02_07-AES.mp45.13MB
02. Algorithms/02_08-Modern Cryptanalysis.mp42.95MB
02. Algorithms/02_09-Compression and Error Correction.mp46.05MB
02. Algorithms/02_10-Public and Private Keys.mp44.48MB
02. Algorithms/02_11-Inverse Exponents Example.mp47.18MB
02. Algorithms/02_12-Finding Inverse Exponents.mp45.68MB
02. Algorithms/02_13-The RSA Algorithm.mp43.7MB
02. Algorithms/02_14-Patterns in RSA.mp47.59MB
02. Algorithms/02_15-Elliptic Curve.mp45.34MB
02. Algorithms/02_16-Digital Signatures.mp44.15MB
02. Algorithms/02_17-Hashing Algorithms.mp44.78MB
02. Algorithms/02_18-Birthday Attack.mp47.48MB
02. Algorithms/02_19-Trust.mp43.15MB
02. Algorithms/02_20-Summary.mp41.8MB
03. APIs/03_01-Symmetric Java APIs.mp44.89MB
03. APIs/03_02-AES in Java.mp431.71MB
03. APIs/03_03-Asymmetric Java APIs.mp42.85MB
03. APIs/03_04-RSA in Java.mp428.37MB
03. APIs/03_05-Bouncy Castle for Java.mp46.35MB
03. APIs/03_06-.NET Crypto API.mp41.66MB
03. APIs/03_07-AES in .NET.mp429.68MB
03. APIs/03_08-RSA in .NET.mp438.2MB
03. APIs/03_09-Summary.mp41.74MB
04. Transport Layer Security/04_01-X.509 Certificates.mp413.14MB
04. Transport Layer Security/04_02-RSA Key Pair.mp47.37MB
04. Transport Layer Security/04_03-Certificate Signing Request.mp411.96MB
04. Transport Layer Security/04_04-Personal Information Exchange.mp417.59MB
04. Transport Layer Security/04_05-IIS.mp49.77MB
04. Transport Layer Security/04_06-Tomcat.mp44.54MB
04. Transport Layer Security/04_07-Naked Keys.mp41.29MB
04. Transport Layer Security/04_08-Apache.mp44.59MB
04. Transport Layer Security/04_09-Summary.mp41.24MB
05. Authentication and Authorization/05_01-Passwords.mp43.72MB
05. Authentication and Authorization/05_02-Hashed Passwords.mp43.74MB
05. Authentication and Authorization/05_03-Rainbow Tables.mp46.06MB
05. Authentication and Authorization/05_04-Salted Hashed Passwords.mp42.93MB
05. Authentication and Authorization/05_05-Computing Password Entropy.mp46.3MB
05. Authentication and Authorization/05_06-Password Based Key Derivation Functions.mp47.21MB
05. Authentication and Authorization/05_07-Progressive Salted Hashed Passwords.mp44MB
05. Authentication and Authorization/05_08-Federation.mp46.49MB
05. Authentication and Authorization/05_09-Kerberos.mp42.01MB
05. Authentication and Authorization/05_10-WS-Trust and WS-Federation.mp44.41MB
05. Authentication and Authorization/05_11-XML Signature Wrapping Attacks.mp43.53MB
05. Authentication and Authorization/05_12-OAuth.mp49.86MB
05. Authentication and Authorization/05_13-OpenID Connect.mp44.14MB
05. Authentication and Authorization/05_14-Conclusion.mp41.72MB
06. Case Studies/06_01-Snapchat.mp48.32MB
06. Case Studies/06_02-Safari.mp46.03MB
06. Case Studies/06_03-Heartbleed.mp49.68MB
06. Case Studies/06_04-Target.mp412.75MB
06. Case Studies/06_05-NSA.mp48.71MB
06. Case Studies/06_06-Lessons Learned.mp41.76MB
07. Decentralized Systems/07_01-PGP.mp44.98MB
07. Decentralized Systems/07_02-Establishing Trust.mp47.7MB
07. Decentralized Systems/07_03-Hashcash.mp44.65MB
07. Decentralized Systems/07_04-Bitcoin.mp45.99MB
07. Decentralized Systems/07_05-Proof of Work.mp44.71MB
07. Decentralized Systems/07_06-Conflict Resolution.mp45.8MB
07. Decentralized Systems/07_07-Mining.mp44.06MB
07. Decentralized Systems/07_08-Freenet.mp46.79MB
07. Decentralized Systems/07_09-Untrusted Networks.mp49.9MB
07. Decentralized Systems/07_10-Conclusion.mp44.53MB