本站已收录 番号和无损神作磁力链接/BT种子 

[FreeCourseLab.com] Udemy - Cryptography using Python

种子简介

种子名称: [FreeCourseLab.com] Udemy - Cryptography using Python
文件类型: 视频
文件数目: 42个文件
文件大小: 1.78 GB
收录时间: 2020-1-7 06:24
已经下载: 3
资源热度: 128
最近下载: 2024-8-15 22:37

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:b6626f8a7b58194b1bdef5abbb88ee24d1f83305&dn=[FreeCourseLab.com] Udemy - Cryptography using Python 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

[FreeCourseLab.com] Udemy - Cryptography using Python.torrent
  • 1. Introduction/1. Introduction to Cryptography using Python.mp43.98MB
  • 2. Getting Started Cryptography using Python/1. Understanding the Process of Cryptography.mp420.23MB
  • 2. Getting Started Cryptography using Python/2. Purpose of Python as a Tool.mp427.29MB
  • 2. Getting Started Cryptography using Python/3. Algorithm on Reverse Cipher.mp435.07MB
  • 3. Ceaser Cipher Algorithm and Transposition Cipher/1. Understanding Ceaser Cipher.mp431.88MB
  • 3. Ceaser Cipher Algorithm and Transposition Cipher/2. Algorithm on Pyperclip.mp433.58MB
  • 3. Ceaser Cipher Algorithm and Transposition Cipher/3. Concept of Brute Force Attack.mp427.69MB
  • 3. Ceaser Cipher Algorithm and Transposition Cipher/4. Functions of Transposition Cipher.mp417.65MB
  • 3. Ceaser Cipher Algorithm and Transposition Cipher/5. Transposition Cipher Encryption Program.mp431.98MB
  • 4. Cipher Decryption Program/1. Decryption of Transposition Cipher.mp447.77MB
  • 4. Cipher Decryption Program/10. Learning the Substitution Cipher.mp439.41MB
  • 4. Cipher Decryption Program/11. Implementing Substitution Cipher.mp451.7MB
  • 4. Cipher Decryption Program/12. Functions of Random Key.mp441.12MB
  • 4. Cipher Decryption Program/13. Runnig Code for Subsitution Cipher.mp418.17MB
  • 4. Cipher Decryption Program/14. Hacking the Substitution Cipher.mp482.05MB
  • 4. Cipher Decryption Program/2. Detecting English Programmatically.mp457.63MB
  • 4. Cipher Decryption Program/3. Output of Dictionary List.mp432.11MB
  • 4. Cipher Decryption Program/4. The Multiplicative Cipher.mp427.83MB
  • 4. Cipher Decryption Program/5. Creating Cryptomath Module.mp419.75MB
  • 4. Cipher Decryption Program/6. Affine Cipher Encryption.mp481.36MB
  • 4. Cipher Decryption Program/7. Understanding the Decrypting Functionality.mp444.54MB
  • 4. Cipher Decryption Program/8. Hacking the Affine Cipher.mp470.17MB
  • 4. Cipher Decryption Program/9. Modifying and Hacking Affline.mp431.76MB
  • 5. Hacking Process of Vignere Cipher/1. Concept of Vernam Cipher.mp419.96MB
  • 5. Hacking Process of Vignere Cipher/2. Understanding the Implementation of Vernam Cipher.mp441.05MB
  • 5. Hacking Process of Vignere Cipher/3. Implementation of Vignere Cipher.mp480.04MB
  • 5. Hacking Process of Vignere Cipher/4. Hacking the Vignere Cipher.mp468.56MB
  • 5. Hacking Process of Vignere Cipher/5. Base64 for Encoding and Decoding.mp433.83MB
  • 5. Hacking Process of Vignere Cipher/6. Understanding MD5 and SHA Hashes.mp466.02MB
  • 5. Hacking Process of Vignere Cipher/7. The XOR Type of Encryption.mp437.86MB
  • 6. Cryptography Plugin/1. Cracking Passwords using Python.mp472.33MB
  • 6. Cryptography Plugin/2. Understanding Cryptography Plugin.mp430.78MB
  • 6. Cryptography Plugin/3. Learning the Pycrypto Plugin.mp433.87MB
  • 6. Cryptography Plugin/4. Symmetric and Asymmetric Cryptography.mp4105.4MB
  • 6. Cryptography Plugin/5. Understanding Primary Numbers Calculations.mp436.4MB
  • 6. Cryptography Plugin/6. Rabin Miller Algorithm.mp460.27MB
  • 6. Cryptography Plugin/7. Public Key Cryptography.mp434.3MB
  • 6. Cryptography Plugin/8. Concept of RSA Algorithm.mp436.62MB
  • 7. Calculating RSA keys/1. Implementation of making RSA Keys.mp443.13MB
  • 7. Calculating RSA keys/2. Returning the Private Key for Execution.mp454.46MB
  • 8. RSA Cipher/1. Creating RSA Algorithm Implementation.mp440.31MB
  • 8. RSA Cipher/2. RSA Algorithm Implementation.mp448.69MB