download скачать Free download скачать : Effective Cryptography
mp4 | Video: h264,1920X1080 | Audio: AAC, 44.1 KHz
Genre:eLearning | Language: English | Size:1.07 GB
Files Included :
1 - Introduction.mp4 (30.36 MB)
MP4
2 - What you will learn.mp4 (30.61 MB)
MP4
10 - Prime Numbers.mp4 (1.12 MB)
MP4
11 - Summary.mp4 (5.34 MB)
MP4
3 - Objectives.mp4 (4.16 MB)
MP4
4 - What is the challenge with communication across an untrusted medium.mp4 (8.99 MB)
MP4
5 - What is Cryptography.mp4 (6.76 MB)
MP4
6 - Security by obscurity is not security.mp4 (5.92 MB)
MP4
7 - Why learn Cryptography.mp4 (7.83 MB)
MP4
8 - The key is the key.mp4 (6.01 MB)
MP4
9 - Data Representation and Number System.mp4 (141.64 MB)
MP4
12 - Objectives.mp4 (2.71 MB)
MP4
13 - Key terms related to cryptography.mp4 (6.19 MB)
MP4
14 - Overview of Cryptology.mp4 (3.37 MB)
MP4
15 - Modulo Functions.mp4 (4.44 MB)
MP4
16 - Monoalphabetic and Polyalphabetic Ciphers.mp4 (2.62 MB)
MP4
17 - Caesar Cipher.mp4 (3.08 MB)
MP4
18 - Demo Caesar Cipher.mp4 (26.45 MB)
MP4
19 - Vigenere Cipher.mp4 (3.25 MB)
MP4
20 - Demo Vigenere Cipher.mp4 (14.61 MB)
MP4
21 - The unbreakable cipher.mp4 (6.13 MB)
MP4
22 - Goals of Cryptography.mp4 (5.6 MB)
MP4
23 - Cryptosystems.mp4 (2.4 MB)
MP4
24 - Keys.mp4 (2.88 MB)
MP4
25 - Key Space.mp4 (4.63 MB)
MP4
26 - Cryptography at a larger scale.mp4 (6.99 MB)
MP4
27 - The challenge of secure communication.mp4 (4.85 MB)
MP4
28 - XOR.mp4 (4.47 MB)
MP4
29 - Encryption.mp4 (11.86 MB)
MP4
30 - Decryption.mp4 (1.12 MB)
MP4
31 - Summary.mp4 (3.77 MB)
MP4
32 - Objectives.mp4 (3.7 MB)
MP4
33 - Types of Cryptosystems.mp4 (11.57 MB)
MP4
34 - Symmetric Key Cryptosystem.mp4 (8.36 MB)
MP4
35 - Techniques in Symmetric Encryption.mp4 (14.91 MB)
MP4
36 - Stream Ciphers.mp4 (7.83 MB)
MP4
37 - Block Ciphers.mp4 (5.13 MB)
MP4
38 - Modes of Operation of Block Ciphers.mp4 (19.38 MB)
MP4
39 - Block Cipher Primitives Confusion and Diffusion.mp4 (3.28 MB)
MP4
40 - DES.mp4 (4.62 MB)
MP4
41 - Weakness in DES.mp4 (5.8 MB)
MP4
42 - DES is not a Group.mp4 (3.65 MB)
MP4
43 - Meet in the Middle Attack.mp4 (6.64 MB)
MP4
44 - Demo DES.mp4 (38.29 MB)
MP4
45 - 3DES.mp4 (5.32 MB)
MP4
46 - AES.mp4 (9.11 MB)
MP4
47 - AES Algorithm.mp4 (8.11 MB)
MP4
48 - AES with CBC.mp4 (2.73 MB)
MP4
49 - Demo AES.mp4 (27.84 MB)
MP4
50 - Asymmetric Key Cryptosystem.mp4 (6.78 MB)
MP4
51 - Problems with Symmetric Encryption.mp4 (7.5 MB)
MP4
52 - Asymmetric Key Cryptosystems.mp4 (10.85 MB)
MP4
53 - Mathematics behind Asymmetric Encryption.mp4 (11.95 MB)
MP4
54 - Essential Number Theory for Public Key Algorithms.mp4 (3.96 MB)
MP4
55 - Euclidean Algorithm.mp4 (6.9 MB)
MP4
56 - Relative Prime Numbers.mp4 (3.48 MB)
MP4
57 - Modular Exponentiation.mp4 (15.18 MB)
MP4
58 - Multiplicative Inverse.mp4 (4.12 MB)
MP4
59 - Main Use of Asymmetric keys.mp4 (4.36 MB)
MP4
60 - Concepts in Cryptography.mp4 (9.71 MB)
MP4
61 - Difficulty of Factoring a Large Integer into Its Two Prime Factors.mp4 (3.97 MB)
MP4
62 - Difficulty of Solving the Discrete Logarithm Problem for Finite Fields.mp4 (7.65 MB)
MP4
63 - Difficulty of Solving Discrete Logarithm Problem as Applied to Elliptic Curves.mp4 (4.21 MB)
MP4
64 - RSA.mp4 (7.27 MB)
MP4
65 - Basic Steps to Create an RSA Public Private Key Pair.mp4 (26.44 MB)
MP4
66 - Elliptic Curve Cryptosystem.mp4 (10.85 MB)
MP4
67 - DiffieHellman Key Exchange.mp4 (3.54 MB)
MP4
68 - How does DiffieHellman work.mp4 (15.69 MB)
MP4
69 - Demo DiffieHellman.mp4 (12.52 MB)
MP4
70 - Hash Functions.mp4 (8.11 MB)
MP4
71 - What is Collision in Hashing.mp4 (3.88 MB)
MP4
72 - Use of Hash in Password.mp4 (4.36 MB)
MP4
73 - MD5.mp4 (4.72 MB)
MP4
74 - Secure Hash Algorithm.mp4 (5.66 MB)
MP4
75 - Hash Based Message Authentication Code.mp4 (7.76 MB)
MP4
76 - Summary.mp4 (10.56 MB)
MP4
Rijndael Animation v4 eng.swf (152.7 KB)
SWF
100 - Digital Certificates.mp4 (8.84 MB)
MP4
101 - Certificate Authority CA.mp4 (17.43 MB)
MP4
102 - Key Management and Certificate Lifecycle.mp4 (16.59 MB)
MP4
103 - Use cases of PKI Certificates.mp4 (4.23 MB)
MP4
104 - PKI Components.mp4 (5.55 MB)
MP4
105 - Digital Signature.mp4 (9.53 MB)
MP4
106 - Demo Digital Signatures.mp4 (13.42 MB)
MP4
107 - Summary.mp4 (7.73 MB)
MP4
77 - Objectives.mp4 (4.69 MB)
MP4
78 - Transport Layer Security.mp4 (13.49 MB)
MP4
79 - Cipher Suite.mp4 (4.04 MB)
MP4
80 - Typical Enterprise Network.mp4 (4.39 MB)
MP4
81 - Virtual Private Networks.mp4 (9.17 MB)
MP4
82 - VPN Advantages.mp4 (4.54 MB)
MP4
83 - VPN Disadvantages.mp4 (3.29 MB)
MP4
84 - Types of Remote Access VPN.mp4 (7.53 MB)
MP4
85 - IP Security Protocol.mp4 (4.94 MB)
MP4
86 - Authentication Header AH.mp4 (15.71 MB)
MP4
87 - Encapsulating Security Payload ESP.mp4 (15.88 MB)
MP4
88 - Security Associations SA.mp4 (8.26 MB)
MP4
89 - Transport Mode.mp4 (4 MB)
MP4
90 - Tunnel Mode.mp4 (5.37 MB)
MP4
91 - IPsec Key Management.mp4 (24.03 MB)
MP4
92 - SSL VPN.mp4 (4.69 MB)
MP4
93 - VPN Components.mp4 (6.48 MB)
MP4
94 - Watch that VPN.mp4 (7.68 MB)
MP4
95 - Secure Email with SMIME.mp4 (19.42 MB)
MP4
96 - Demo SMIME.mp4 (39.85 MB)
MP4
97 - Full Disk Encryption.mp4 (16.95 MB)
MP4
98 - Problem of Asymmetric Algorithms.mp4 (8.59 MB)
MP4
99 - Public Key Infrastructure PKI.mp4 (3.83 MB)
MP4
https://rapidgator.net/file/c765c8fd01bc641e063975a435f00e1c/Effective_Cryptography.part1.rar https://rapidgator.net/file/632179f21007fdedefbd4441d4261130/Effective_Cryptography.part2.rar
https://nitroflare.com/view/6C679B97D04A273/Effective_Cryptography.part1.rar https://nitroflare.com/view/15C725682E93680/Effective_Cryptography.part2.rar