Pluralsight-Cryptography-EeQ5
- 01. History of Cryptography01_01-Introduction.mp410.61MB
- 01. History of Cryptography01_02-One-Time Pads.mp46.45MB
- 01. History of Cryptography01_03-Entropy.mp48.43MB
- 01. History of Cryptography01_04-The Enig Machine.mp411.90MB
- 01. History of Cryptography01_05-Cryptanalysis.mp410.35MB
- 01. History of Cryptography01_06-Diffie-Helln.mp415.40MB
- 01. History of Cryptography01_07-Diffie-Helln Example.mp411.12MB
- 01. History of Cryptography01_08-Conclusion.mp42.32MB
- 02. Algorithms02_01-Introduction.mp41.06MB
- 02. Algorithms02_02-Block Ciphers.mp43.06MB
- 02. Algorithms02_03-Confusion and Key Schedules.mp41.94MB
- 02. Algorithms02_04-Diffusion and Cipher Block Chaining.mp43.48MB
- 02. Algorithms02_05-Initialization Vectors.mp41.40MB
- 02. Algorithms02_06-DES.mp41.90MB
- 02. Algorithms02_07-AES.mp45.13MB
- 02. Algorithms02_08-Modern Cryptanalysis.mp42.95MB
- 02. Algorithms02_09-Compression and Error Correction.mp46.05MB
- 02. Algorithms02_10-Public and Private Keys.mp44.48MB
- 02. Algorithms02_11-Inverse Exponents Example.mp47.18MB
- 02. Algorithms02_12-Finding Inverse Exponents.mp45.68MB
- 02. Algorithms02_13-The RSA Algorithm.mp43.70MB
- 02. Algorithms02_14-Patterns in RSA.mp47.59MB
- 02. Algorithms02_15-Elliptic Curve.mp45.34MB
- 02. Algorithms02_16-Digital Signatures.mp44.15MB
- 02. Algorithms02_17-Hashing Algorithms.mp44.78MB
- 02. Algorithms02_18-Birthday Attack.mp47.48MB
- 02. Algorithms02_19-Trust.mp43.15MB
- 02. Algorithms02_20-Sumry.mp41.80MB
- 03. APIs03_01-Symmetric Ja APIs.mp44.89MB
- 03. APIs03_02-AES in Ja.mp431.71MB
- 03. APIs03_03-Asymmetric Ja APIs.mp42.85MB
- 03. APIs03_04-RSA in Ja.mp428.37MB
- 03. APIs03_05-Bouncy Castle for Ja.mp46.35MB
- 03. Crypto API.mp41.66MB
- 03. APIs03_07-AES in .NET.mp429.68MB
- 03. APIs03_08-RSA in .NET.mp438.20MB
- 03. APIs03_09-Sumry.mp41.74MB
- 04. Transport Layer Security04_01-X.509 Certificates.mp413.14MB
- 04. Transport Layer Security04_02-RSA Key Pair.mp47.37MB
- 04. Transport Layer Security04_03-Certificate Signing Request.mp411.96MB
- 04. Transport Layer Security04_04-Personal Infortion Exchange.mp417.59MB
- 04. Transport Layer Security04_05-IIS.mp49.77MB
- 04. Transport Layer Security04_06-Tomcat.mp44.54MB
- 04. Transport Layer Security04_07-Naked Keys.mp41.29MB
- 04. Transport Layer Security04_08-Apache.mp44.59MB
- 04. Transport Layer Security04_09-Sumry.mp41.24MB
- 05. Authentication and Authorization05_01-Passwords.mp43.72MB
- 05. Authentication and Authorization05_02-Hashed Passwords.mp43.74MB
- 05. Authentication and Authorization05_03-Rainbow Tables.mp46.06MB
- 05. Authentication and Authorization05_04-Salted Hashed Passwords.mp42.93MB
- 05. Authentication and Authorization05_05-Computing Password Entropy.mp46.30MB
- 05. Authentication and Authorization05_06-Password Based Key Derivation Functions.mp47.21MB
- 05. Authentication and Authorization05_07-Progressive Salted Hashed Passwords.mp44.00MB
- 05. Authentication and Authorization05_08-Federation.mp46.49MB
- 05. Authentication and Authorization05_09-Kerberos.mp42.01MB
- 05. Authentication and Authorization05_10-WS-Trust and WS-Federation.mp44.41MB
- 05. Authentication and Authorization05_11-XML Signature Wrapping Attacks.mp43.53MB
- 05. Authentication and Authorization05_12-OAuth.mp49.86MB
- 05. Authentication and Authorization05_13-OpenID Connect.mp44.14MB
- 05. Authentication and Authorization05_14-Conclusion.mp41.72MB
- 06. Case Studies06_01-Snapchat.mp48.32MB
- 06. Case Studies06_02-Safari.mp46.03MB
- 06. Case Studies06_03-Heartbleed.mp49.68MB
- 06. Case Studies06_04-Target.mp412.75MB
- 06. Case Studies06_05-NSA.mp48.71MB
- 06. Case Studies06_06-Lessons Learned.mp41.76MB
- 07. Decentralized Systems07_01-PGP.mp44.98MB
- 07. Decentralized Systems07_02-Establishing Trust.mp47.70MB
- 07. Decentralized Systems07_03-Hashcash.mp44.65MB
- 07. Decentralized Systems07_04-Bitcoin.mp45.99MB
- 07. Decentralized Systems07_05-Proof of Work.mp44.71MB
- 07. Decentralized Systems07_06-Conflict Resolution.mp45.80MB
- 07. Decentralized Systems07_07-Mining.mp44.06MB
- 07. Decentralized Systems07_08-Freenet.mp46.79MB
- 07. Decentralized Systems07_09-Untrusted Networks.mp49.90MB
- 07. Decentralized Systems07_10-Conclusion.mp44.53MB
- CreateTime2018-05-25
- UpdateTime2018-07-22
- FileTotalCount76
- TotalSize1.07GBHotTimes6ViewTimes10DMCA Report EmailmagnetLinkThunderTorrent DownBaiduYunLatest Search: 1.ATKD-190 2.MBYD-123 3.DFDA-084 4.APOV-001 5.HAVD-771 6.ARBX-015 7.MXPD-002 8.HITMA-158 9.RKI-234 10.PSSD-127 11.WANZ-005 12.GEN-049 13.OBA-03 14.UK-50 15.IDBD-367 16.IDBD-459 17.QQ-002 18.CWM-054 19.ONSD-517 20.ONSD-456 21.IDBD-360 22.WANZ-017 23.MKCK-052 24.ONSD-648 25.AMBI-22 26.CWM-136 27.MADV-097 28.MIBD-466 29.ONSD-657 30.JUSD-388 31.ID-18024 32.SUPD-097 33.CWM-018 34.OPBD-079 35.YLW-4050 36.OOMN-042 37.BOBB-133 38.IDBD-427 39.IDBD-329 40.SERO-0173 41.CJET-18 42.MIAD-619 43.KTKX-030 44.TMRD-540 45.UMD-12 46.GAS-069 47.HIMA-17 48.REBD-047 49.KCC-047 50.OTLD-029 51.ADVVSR-0582 52.AMD-330 53.IMG-304 54.COLE-043 55.PBZ-015 56.GGIL-001 57.HKM-012 58.SPZ-258 59.ISV-024 60.SAMA-587 61.MIAD-241C 62.DBVBEX-002 63.TDMJ-100 64.HS-029 65.RNADE-283 66.OKJU-018 67.P-1300027 68.KTRD-017 69.KS-8147 70.DFAK-009 71.190 72.123 73.084 74.001 75.771 76.015 77.002 78.158 79.234 80.127 81.005 82.049 83.03 84.50 85.367 86.459 87.002 88.054 89.517 90.456 91.360 92.017 93.052 94.8 95.22 96.136 97.097 98.466 99.657 100.388 101.18024 102.097 103.018 104.079 105.4050 106.042 107.133 108.427 109.329 110.0173 111.18 112.619 113.030 114.540 115.12 116.069 117.17 118.047 119.047 120.029 121.0582 122.330 123.304 124.043 125.015 126.001 127.012 128.258 129.024 130.587 131.241C 132.002 133.100 134.029 135.283 136.018 137.1300027 138.017 139.8147 140.009